Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-x46m-gg6j-22gf

Опубликовано: 21 апр. 2022
Источник: github
Github: Не прошло ревью
CVSS3: 7.5

Описание

In APache APISIX before 3.13.1, an attacker can obtain a plugin-configured secret via an error message response by sending an incorrect JSON Web Token to a route protected by the jwt-auth plugin. The error logic in the dependency library lua-resty-jwt enables sending an RS256 token to an endpoint that requires an HS256 token, with the original secret value included in the error response.

In APache APISIX before 3.13.1, an attacker can obtain a plugin-configured secret via an error message response by sending an incorrect JSON Web Token to a route protected by the jwt-auth plugin. The error logic in the dependency library lua-resty-jwt enables sending an RS256 token to an endpoint that requires an HS256 token, with the original secret value included in the error response.

EPSS

Процентиль: 97%
0.36449
Средний

7.5 High

CVSS3

Дефекты

CWE-209

Связанные уязвимости

CVSS3: 7.5
nvd
почти 4 года назад

In APache APISIX before 3.13.1, the jwt-auth plugin has a security issue that leaks the user's secret key because the error message returned from the dependency lua-resty-jwt contains sensitive information.

CVSS3: 7.5
fstec
почти 4 года назад

Уязвимость плагина jwt-auth облачного API-шлюза Apache APISIX, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

EPSS

Процентиль: 97%
0.36449
Средний

7.5 High

CVSS3

Дефекты

CWE-209