Описание
Signal K Server is a server application that runs on a central hub in a boat. Versions prior to 2.19.0 expose two features that can be chained together to steal JWT authentication tokens without any prior authentication. The attack combines WebSocket-based request enumeration with unauthenticated polling of access request status. The first is Unauthenticated WebSocket Request Enumeration: When a WebSocket client connects to the SignalK stream endpoint with the serverevents=all query parameter, the server sends all cached server events including ACCESS_REQUEST events that contain details about pending access requests. The startServerEvents function iterates over app.lastServerEvents and writes each cached event to any connected client without verifying authorization level. Since WebSocket connections are allowed for readonly users (which includes unauthenticated users when allow_readonly is true), attackers receive these events containing request IDs, client identifiers, descr
Ссылки
- Release Notes
- ExploitVendor Advisory
Уязвимые конфигурации
Одно из
EPSS
9.1 Critical
CVSS3
Дефекты
Связанные уязвимости
Signal K Server vulnerable to JWT Token Theft via WebSocket Enumeration and Unauthenticated Polling
EPSS
9.1 Critical
CVSS3