Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-j752-cjcj-w847

Опубликовано: 15 апр. 2025
Источник: github
Github: Прошло ревью
CVSS3: 9.8

Описание

Dpanel's hard-coded JWT secret leads to remote code execution

Summary

The Dpanel service contains a hardcoded JWT secret in its default configuration, allowing attackers to generate valid JWT tokens and compromise the host machine.

Details

The Dpanel service, when initiated using its default configuration, includes a hardcoded JWT secret embedded directly within its source code. This security flaw allows attackers to analyze the source code, discover the embedded secret, and craft legitimate JWT tokens. By forging these tokens, an attacker can successfully bypass authentication mechanisms, impersonate privileged users, and gain unauthorized administrative access. Consequently, this enables full control over the host machine, potentially leading to severe consequences such as sensitive data exposure, unauthorized command execution, privilege escalation, or further lateral movement within the network environment. It is recommended to replace the hardcoded secret with a securely generated value and load it from secure configuration storage to mitigate this vulnerability.

PoC

The core code snippet is shown below:

import jwt def generate_jwt(appname): payload = { "SECRET_KEY":"SECRET_VALUE", } print("appname:", appname) print("payload:", str(payload)) token = jwt.encode(payload, SECRET_KEY.format(APP_NAME=appname), algorithm="HS256") return token appname = "SECRET_KEY" token = generate_jwt(appname) print("url token:", token)

Impact

Attackers who successfully exploit this vulnerability can write arbitrary files to the host machine's file system, and all users with Dpanel versions less than 1.6.1 are affected.

Пакеты

Наименование

github.com/donknap/dpanel

go
Затронутые версииВерсия исправления

< 1.6.1

1.6.1

EPSS

Процентиль: 16%
0.00052
Низкий

9.8 Critical

CVSS3

Дефекты

CWE-321
CWE-453
CWE-547

Связанные уязвимости

CVSS3: 9.8
nvd
10 месяцев назад

Dpanel is a Docker visualization panel system which provides complete Docker management functions. The Dpanel service contains a hardcoded JWT secret in its default configuration, allowing attackers to generate valid JWT tokens and compromise the host machine. This security flaw allows attackers to analyze the source code, discover the embedded secret, and craft legitimate JWT tokens. By forging these tokens, an attacker can successfully bypass authentication mechanisms, impersonate privileged users, and gain unauthorized administrative access. Consequently, this enables full control over the host machine, potentially leading to severe consequences such as sensitive data exposure, unauthorized command execution, privilege escalation, or further lateral movement within the network environment. This issue is patched in version 1.6.1. A workaround for this vulnerability involves replacing the hardcoded secret with a securely generated value and load it from secure configuration storage.

CVSS3: 9.8
fstec
10 месяцев назад

Уязвимость панели визуального управления для Docker Dpanel, связанная с использованием жестко закодированного криптографического ключа, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

EPSS

Процентиль: 16%
0.00052
Низкий

9.8 Critical

CVSS3

Дефекты

CWE-321
CWE-453
CWE-547