Логотип exploitDog
bind:CVE-2025-68620
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-68620

Количество 2

Количество 2

nvd логотип

CVE-2025-68620

около 1 месяца назад

Signal K Server is a server application that runs on a central hub in a boat. Versions prior to 2.19.0 expose two features that can be chained together to steal JWT authentication tokens without any prior authentication. The attack combines WebSocket-based request enumeration with unauthenticated polling of access request status. The first is Unauthenticated WebSocket Request Enumeration: When a WebSocket client connects to the SignalK stream endpoint with the `serverevents=all` query parameter, the server sends all cached server events including `ACCESS_REQUEST` events that contain details about pending access requests. The `startServerEvents` function iterates over `app.lastServerEvents` and writes each cached event to any connected client without verifying authorization level. Since WebSocket connections are allowed for readonly users (which includes unauthenticated users when `allow_readonly` is true), attackers receive these events containing request IDs, client identifiers, descr

CVSS3: 9.1
EPSS: Низкий
github логотип

GHSA-fq56-hvg6-wvm5

около 1 месяца назад

Signal K Server vulnerable to JWT Token Theft via WebSocket Enumeration and Unauthenticated Polling

CVSS3: 9.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-68620

Signal K Server is a server application that runs on a central hub in a boat. Versions prior to 2.19.0 expose two features that can be chained together to steal JWT authentication tokens without any prior authentication. The attack combines WebSocket-based request enumeration with unauthenticated polling of access request status. The first is Unauthenticated WebSocket Request Enumeration: When a WebSocket client connects to the SignalK stream endpoint with the `serverevents=all` query parameter, the server sends all cached server events including `ACCESS_REQUEST` events that contain details about pending access requests. The `startServerEvents` function iterates over `app.lastServerEvents` and writes each cached event to any connected client without verifying authorization level. Since WebSocket connections are allowed for readonly users (which includes unauthenticated users when `allow_readonly` is true), attackers receive these events containing request IDs, client identifiers, descr

CVSS3: 9.1
0%
Низкий
около 1 месяца назад
github логотип
GHSA-fq56-hvg6-wvm5

Signal K Server vulnerable to JWT Token Theft via WebSocket Enumeration and Unauthenticated Polling

CVSS3: 9.1
0%
Низкий
около 1 месяца назад

Уязвимостей на страницу