Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2023-3612

Summary
Assigner-SK-CERT
Assigner Org ID-bc375322-d3d7-4481-b261-e29662236cfd
Published At-11 Sep, 2023 | 09:04
Updated At-26 Sep, 2024 | 14:32
Rejected At-
Credits

Unprotected WebView access in Govee Home App

Govee Home app has unprotected access to WebView component which can be opened by any app on the device. By sending an URL to a specially crafted site, the attacker can execute JavaScript in context of WebView or steal sensitive user data by displaying phishing content.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:SK-CERT
Assigner Org ID:bc375322-d3d7-4481-b261-e29662236cfd
Published At:11 Sep, 2023 | 09:04
Updated At:26 Sep, 2024 | 14:32
Rejected At:
▼CVE Numbering Authority (CNA)
Unprotected WebView access in Govee Home App

Govee Home app has unprotected access to WebView component which can be opened by any app on the device. By sending an URL to a specially crafted site, the attacker can execute JavaScript in context of WebView or steal sensitive user data by displaying phishing content.

Affected Products
Vendor
Govee
Product
Govee Home
Platforms
  • Android
  • iOS
Default Status
unaffected
Versions
Affected
  • From 5.7.03 before 5.8.01 (custom)
Problem Types
TypeCWE IDDescription
CWECWE-749CWE-749 Exposed Dangerous Method or Function
Type: CWE
CWE ID: CWE-749
Description: CWE-749 Exposed Dangerous Method or Function
Metrics
VersionBase scoreBase severityVector
3.18.2HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N
Version: 3.1
Base score: 8.2
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
CAPEC-98CAPEC-98 Phishing
CAPEC-19CAPEC-19 Embedding Scripts within Scripts
CAPEC-22CAPEC-22 Exploiting Trust in Client
CAPEC ID: CAPEC-98
Description: CAPEC-98 Phishing
CAPEC ID: CAPEC-19
Description: CAPEC-19 Embedding Scripts within Scripts
CAPEC ID: CAPEC-22
Description: CAPEC-22 Exploiting Trust in Client
Solutions

Update to version 5.8.01 (released on 17.08.2023) or latest

Configurations

Workarounds

Exploits

Credits

finder
Jan Adamski (johnny1337.pl; jan.adamski@nask.pl)
Timeline
EventDate
Received information about vulnerability from a security researcher - Jan Adamski (johnny1337.pl; jan.adamski@nask.pl)2023-07-10 11:00:00
Initial notification of the vendor2023-07-11 11:39:00
Vendor confirmed the receipt of vulnerability report2023-08-03 13:25:00
Vendor informed about security update being released on 17.08.20232023-08-10 13:25:00
Updated version of the application released2023-08-17 00:00:00
Event: Received information about vulnerability from a security researcher - Jan Adamski (johnny1337.pl; jan.adamski@nask.pl)
Date: 2023-07-10 11:00:00
Event: Initial notification of the vendor
Date: 2023-07-11 11:39:00
Event: Vendor confirmed the receipt of vulnerability report
Date: 2023-08-03 13:25:00
Event: Vendor informed about security update being released on 17.08.2023
Date: 2023-08-10 13:25:00
Event: Updated version of the application released
Date: 2023-08-17 00:00:00
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.sk-cert.sk/threat/sk-cert-bezpecnostne-varovanie-v20230811-10
N/A
Hyperlink: https://www.sk-cert.sk/threat/sk-cert-bezpecnostne-varovanie-v20230811-10
Resource: N/A
▼Authorized Data Publishers (ADP)
1. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.sk-cert.sk/threat/sk-cert-bezpecnostne-varovanie-v20230811-10
x_transferred
Hyperlink: https://www.sk-cert.sk/threat/sk-cert-bezpecnostne-varovanie-v20230811-10
Resource:
x_transferred
2. CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:incident@nbu.gov.sk
Published At:11 Sep, 2023 | 10:15
Updated At:13 Sep, 2023 | 17:53

Govee Home app has unprotected access to WebView component which can be opened by any app on the device. By sending an URL to a specially crafted site, the attacker can execute JavaScript in context of WebView or steal sensitive user data by displaying phishing content.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.18.8HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Secondary3.18.2HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N
Type: Primary
Version: 3.1
Base score: 8.8
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Type: Secondary
Version: 3.1
Base score: 8.2
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N
CPE Matches

govee
govee
>>home>>Versions before 5.8.01(exclusive)
cpe:2.3:a:govee:home:*:*:*:*:*:android:*:*
govee
govee
>>home>>Versions before 5.8.01(exclusive)
cpe:2.3:a:govee:home:*:*:*:*:*:iphone_os:*:*
Weaknesses
CWE IDTypeSource
NVD-CWE-noinfoPrimarynvd@nist.gov
CWE-749Secondaryincident@nbu.gov.sk
CWE ID: NVD-CWE-noinfo
Type: Primary
Source: nvd@nist.gov
CWE ID: CWE-749
Type: Secondary
Source: incident@nbu.gov.sk
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://www.sk-cert.sk/threat/sk-cert-bezpecnostne-varovanie-v20230811-10incident@nbu.gov.sk
Third Party Advisory
Hyperlink: https://www.sk-cert.sk/threat/sk-cert-bezpecnostne-varovanie-v20230811-10
Source: incident@nbu.gov.sk
Resource:
Third Party Advisory

Change History

0
Information is not available yet

Similar CVEs

1Records found

CVE-2024-55921
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-7.5||HIGH
EPSS-0.13% / 32.55%
||
7 Day CHG+0.03%
Published-14 Jan, 2025 | 19:36
Updated-26 Aug, 2025 | 19:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cross-Site Request Forgery in Extension Manager Module in TYPO3

TYPO3 is a free and open source Content Management Framework. A vulnerability has been identified in the backend user interface functionality involving deep links. Specifically, this functionality is susceptible to Cross-Site Request Forgery (CSRF). Additionally, state-changing actions in downstream components incorrectly accepted submissions via HTTP GET and did not enforce the appropriate HTTP method. Successful exploitation of this vulnerability requires the victim to have an active session on the backend user interface and to be deceived into interacting with a malicious URL targeting the backend, which can occur under the following conditions: The user opens a malicious link, such as one sent via email. The user visits a compromised or manipulated website while the following settings are misconfigured: 1. `security.backend.enforceReferrer` feature is disabled, 2. `BE/cookieSameSite` configuration is set to lax or none. The vulnerability in the affected downstream component “Extension Manager Module” allows attackers to retrieve and install 3rd party extensions from the TYPO3 Extension Repository - which can lead to remote code execution in the worst case. Users are advised to update to TYPO3 versions 11.5.42 ELTS, 12.4.25 LTS, 13.4.3 LTS which fix the problem described.

Action-Not Available
Vendor-TYPO3 Association
Product-typo3typo3
CWE ID-CWE-352
Cross-Site Request Forgery (CSRF)
CWE ID-CWE-749
Exposed Dangerous Method or Function
Details not found