Логотип exploitDog
bind:CVE-2023-27584
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-27584

Количество 2

Количество 2

nvd логотип

CVE-2023-27584

больше 1 года назад

Dragonfly is an open source P2P-based file distribution and image acceleration system. It is hosted by the Cloud Native Computing Foundation (CNCF) as an Incubating Level Project. Dragonfly uses JWT to verify user. However, the secret key for JWT, "Secret Key", is hard coded, which leads to authentication bypass. An attacker can perform any action as a user with admin privileges. This issue has been addressed in release version 2.0.9. All users are advised to upgrade. There are no known workarounds for this vulnerability.

CVSS3: 9.8
EPSS: Средний
github логотип

GHSA-hpc8-7wpm-889w

больше 1 года назад

Dragonfly2 has hard coded cyptographic key

CVSS3: 9.8
EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-27584

Dragonfly is an open source P2P-based file distribution and image acceleration system. It is hosted by the Cloud Native Computing Foundation (CNCF) as an Incubating Level Project. Dragonfly uses JWT to verify user. However, the secret key for JWT, "Secret Key", is hard coded, which leads to authentication bypass. An attacker can perform any action as a user with admin privileges. This issue has been addressed in release version 2.0.9. All users are advised to upgrade. There are no known workarounds for this vulnerability.

CVSS3: 9.8
66%
Средний
больше 1 года назад
github логотип
GHSA-hpc8-7wpm-889w

Dragonfly2 has hard coded cyptographic key

CVSS3: 9.8
66%
Средний
больше 1 года назад

Уязвимостей на страницу