← Advisories

FIBARO System Home Center v5.021 Remote File Include XSS

Medium
Advisory ID
ZSL-2020-5563
Release Date
22 March 2020
Vendor
FIBAR GROUP S.A. - https://www.fibaro.com
Affected Version
Home Center 3, Home Center 2, Home Center Lite, 5.021.38, 4.580, 4.570, 4.540, 4.530, 4.510, 4.180
Tested On
Apache/2.2.16 (Debian), nginx/1.9.5, nginx/1.8.0, lighttpd/1.4.41
Summary

Imagine that you live in a house where everything happens by itself. FIBARO Smart Home takes care of your everyday comfort and safety of all family members and in the meantime, saves energy on every single occasion. All this is possible thanks to Home Center 2 smart home HUB. Home Center 2 is an indispensable part of the FIBARO System without which the rest devices of home automation would be only beautiful objects. The smart home HUB collects and analyzes information about devices, communicates them with each other and thus directs the operation of the entire system and takes care of its security.

Description

The smart home solution is vulnerable to a remote Cross-Site Scripting triggered via a Remote File Inclusion issue by including arbitrary client-side dynamic scripts (JavaScript, VBScript) due to the undocumented proxy API and its url GET parameter. This allows hijacking the current session of the user or changing the look of the page by changing the HTML.

Proof of Concept
Disclosure Timeline
04.02.2020Vulnerability discovered.
15.02.2020Vendor contacted.
17.02.2020Vendor responds asking more details.
17.02.2020Sent details to the vendor.
20.02.2020Asked vendor for status update.
24.02.2020Vendor forwards the case to the technicians.
06.03.2020Asked vendor for status update.
21.03.2020No response from the vendor.
22.03.2020Public security advisory released.
Credits
Vulnerability discovered by Gjoko Krstic
References
Changelog
22.03.2020Initial release
24.03.2020Added reference [1], [2], [3] and [4]
24.03.2026Added reference [5]