CVE-2023-22463: KubePi JwtSigKey – Admin Authentication Bypass

CVE-2023-22463: KubePi JwtSigKey - Admin Authentication Bypass-渗透云记 - 专注于网络安全与技术分享
CVE-2023-22463: KubePi JwtSigKey – Admin Authentication Bypass
此内容为付费阅读,请付费后查看
100积分
付费阅读

漏洞标题

CVE-2023-22463: KubePi JwtSigKey – Admin Authentication Bypass

漏洞描述

KubePi is a k8s panel. The jwt authentication function of KubePi through version 1.6.2 uses hard-coded Jwtsigkeys, resulting in the same Jwtsigkeys for all online projects. This means that an attacker can forge any jwt token to take over the administrator account of any online project. Furthermore, they may use the administrator to take over the k8s cluster of the target enterprise. `session.go`, the use of hard-coded JwtSigKey, allows an attacker to use this value to forge jwt tokens arbitrarily. The JwtSigKey is confidential and should not be hard-coded in the code.

PoC代码

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享