Authorized clients, having an inject_processor secret, could brute-force the secret token value by abusing the fmt parameter to the Proxy-Tokenizer header.
This was fixed in https://github.com/superfly/tokenizer/pull/8 and further mitigated in https://github.com/superfly/tokenizer/pull/9.
{
"cwe_ids": [],
"github_reviewed_at": "2023-07-13T19:56:19Z",
"nvd_published_at": null,
"severity": "MODERATE",
"github_reviewed": true
}