Summary by superevr
If you have a Wemo account, change your password as soon as possible.
If you have a Wemo account, change your password as soon as possible.
Wemo
Hardware Testing
https://appapis.xwemo.com:8443/transition-service/rest/accountEntities
Not to cause offense, but this is probably one of the most egregious security vulnerabilities I have ever found. I found this entirely by accident, while trying to troubleshoot my own Wemo's so that they could turn on my Christmas lights.
Web service Endpoints did not have any authentication to access. For example:
https://appapis.xwemo.com:8443/transition-service/rest/accountEntities
The provided URL provides the username and password hash of all wemo user accounts. The hash is base64 encoded SHA256. It's not salted, and so it is very vulnerable to brute-force attacks.
https://appapis.xwemo.com:8443/transition-service/rest/sessionEntities
The provided URL has authentication tokens for all wemo users.
Both 1 and 2 could be used to directly login and control another users Wemo devices.
Additionally, another URL appears to be related to backend processes, as it contains active Salesforce authentication tokens:
https://appapis.xwemo.com:8443/transition-service/rest/salesforceTokenEntities
I started to write up a report for this, but once I discovered the hashes, I looking and submitted this form.