Description
Home Assistant Community Store (HACS) 1.10.0 contains a path traversal vulnerability that allows unauthenticated attackers to read sensitive files by traversing directories via the /hacsfiles/ endpoint. Attackers can retrieve the .storage/auth file containing user credentials and refresh tokens, then craft valid JWT tokens to gain administrative access to Home Assistant instances.
Problem types
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Product status
Credits
Lyghtnox
References
www.exploit-db.com/exploits/49495 (ExploitDB-49495)
www.home-assistant.io/ (Official Product Homepage)
github.com/hacs/integration (Product Reference)
www.vulncheck.com/...y-store-path-traversal-account-takeover (VulnCheck Advisory: Home Assistant Community Store 1.10.0 Path Traversal Account Takeover)