Количество 3
Количество 3
CVE-2022-29266
In APache APISIX before 3.13.1, the jwt-auth plugin has a security issue that leaks the user's secret key because the error message returned from the dependency lua-resty-jwt contains sensitive information.
GHSA-x46m-gg6j-22gf
In APache APISIX before 3.13.1, an attacker can obtain a plugin-configured secret via an error message response by sending an incorrect JSON Web Token to a route protected by the jwt-auth plugin. The error logic in the dependency library lua-resty-jwt enables sending an RS256 token to an endpoint that requires an HS256 token, with the original secret value included in the error response.
BDU:2022-02939
Уязвимость плагина jwt-auth облачного API-шлюза Apache APISIX, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2022-29266 In APache APISIX before 3.13.1, the jwt-auth plugin has a security issue that leaks the user's secret key because the error message returned from the dependency lua-resty-jwt contains sensitive information. | CVSS3: 7.5 | 36% Средний | почти 4 года назад | |
GHSA-x46m-gg6j-22gf In APache APISIX before 3.13.1, an attacker can obtain a plugin-configured secret via an error message response by sending an incorrect JSON Web Token to a route protected by the jwt-auth plugin. The error logic in the dependency library lua-resty-jwt enables sending an RS256 token to an endpoint that requires an HS256 token, with the original secret value included in the error response. | CVSS3: 7.5 | 36% Средний | почти 4 года назад | |
BDU:2022-02939 Уязвимость плагина jwt-auth облачного API-шлюза Apache APISIX, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации | CVSS3: 7.5 | 36% Средний | почти 4 года назад |
Уязвимостей на страницу