关键信息总结 漏洞标题 HomeAutomation v3.3.2 Authentication Bypass Exploit 漏洞详情 Advisory ID: ZSL-2019-5557 Type: Local/Remote Impact: Security Bypass Risk: 4/5 Release Date: 29.12.2019 漏洞描述 Summary: The application suffers from a vulnerability where spoofing a client's IP address with the local IP address value allows remote control of the smart home solution. 受影响版本 Affected Version: 3.3.2 测试环境 Tested On: - Apache/2.4.41 (centos) OpenSSL/1.0.2k-fips - Apache/2.4.29 (Ubuntu) - PHP/7.3.11 - PHP 7.2.24-0ubuntu0.18.04.1 厂商响应 Vendor Status: - 06.11.2019: 漏洞被发现 - 07.11.2019: 联系厂商 - 29.11.2019: 没有回应 - 30.11.2019: 再次联系厂商 - 28.12.2019: 没有回应 - 29.12.2019: 公开发布安全咨询 证据和贡献 PoC: homeautomation_authbypass.txt Credits: Vulnerability discovered by Gjoko Krstic - 参考链接 [1]: https://www.exploit-db.com/exploits/47807 [2]: https://packetstormsecurity.com/files/155789/HomeAutomation-3.3.2-Authentication-Bypass.html [3]: https://cxsecurity.com/issue/WLB-2019120139 [4]: https://exchange.xforce.ibmcloud.com/vulnerabilities/173658 [5]: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-22001 [6]: https://nvd.nist.gov/vuln/detail/CVE-2020-22001 [7]: https://www.incibe-cert.es/en/early-warning/vulnerabilities/cve-2020-22001 变更日志 Changelog: - 29.12.2019: 初始发布 - 24.01.2020: 添加参考 [1], [2], [3] 和 [4] - 19.06.2021: 添加参考 [5], [6] 和 [7] 联系方式 Contact: Zero Science Lab - Web: http://www.zeroscience.mk - e-mail: lab@zeroscience.mk