CVE-2023-27584: Dragonfly2 < 2.1.0-beta.1 - Hardcoded JWT Secret

CVE-2023-27584: Dragonfly2 < 2.1.0-beta.1 - Hardcoded JWT Secret-渗透云记 - 专注于网络安全与技术分享
CVE-2023-27584: Dragonfly2 < 2.1.0-beta.1 - Hardcoded JWT Secret
此内容为付费阅读,请付费后查看
100积分
付费阅读

漏洞标题

CVE-2023-27584: Dragonfly2 < 2.1.0-beta.1 – Hardcoded JWT Secret

漏洞描述

Dragonfly is an open source P2P-based file distribution and image acceleration system. It is hosted by the Cloud Native Computing Foundation (CNCF) as an Incubating Level Project. Dragonfly uses JWT to verify user. However, the secret key for JWT, "Secret Key", is hard coded, which leads to authentication bypass. An attacker can perform any action as a user with admin privileges. This issue has been addressed in release version 2.0.9. All users are advised to upgrade. There are no known workarounds for this vulnerability.

PoC代码

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享