Логотип exploitDog
bind:CVE-2025-53960
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-53960

Количество 2

Количество 2

nvd логотип

CVE-2025-53960

около 2 месяцев назад

When issuing JSON Web Tokens (JWT), Apache StreamPark directly uses the user's password as the HMAC signing key (e.g., with the HS256 algorithm). An attacker can exploit this vulnerability to perform offline brute-force attacks on the user's password using a captured JWT, or to arbitrarily forge identity tokens for the user if the password is already known, ultimately leading to complete account takeover. This issue affects Apache StreamPark: from 2.0.0 before 2.1.7. Users are recommended to upgrade to version 2.1.7, which fixes the issue.

CVSS3: 5.9
EPSS: Низкий
github логотип

GHSA-3hg2-rh4r-8qf6

около 2 месяцев назад

Apache StreamPark: Use the user’s password as the secret key Vulnerability

CVSS3: 5.9
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-53960

When issuing JSON Web Tokens (JWT), Apache StreamPark directly uses the user's password as the HMAC signing key (e.g., with the HS256 algorithm). An attacker can exploit this vulnerability to perform offline brute-force attacks on the user's password using a captured JWT, or to arbitrarily forge identity tokens for the user if the password is already known, ultimately leading to complete account takeover. This issue affects Apache StreamPark: from 2.0.0 before 2.1.7. Users are recommended to upgrade to version 2.1.7, which fixes the issue.

CVSS3: 5.9
0%
Низкий
около 2 месяцев назад
github логотип
GHSA-3hg2-rh4r-8qf6

Apache StreamPark: Use the user’s password as the secret key Vulnerability

CVSS3: 5.9
0%
Низкий
около 2 месяцев назад

Уязвимостей на страницу