GHSA-vpfp-5gwq-g533

Suggest an improvement
Source
https://github.com/advisories/GHSA-vpfp-5gwq-g533
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/11/GHSA-vpfp-5gwq-g533/GHSA-vpfp-5gwq-g533.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-vpfp-5gwq-g533
Aliases
Published
2021-11-17T23:15:30Z
Modified
2024-02-16T08:24:45.527587Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Improper Authentication in Apache ShenYu Admin
Details

A flaw was found in Apache ShenYu Admin. The incorrect use of JWT in ShenyuAdminBootstrap allows an attacker to bypass authentication. This issue affected Apache ShenYu 2.3.0 and 2.4.0.

Database specific
{
    "nvd_published_at": "2021-11-16T10:15:00Z",
    "cwe_ids": [
        "CWE-287"
    ],
    "severity": "CRITICAL",
    "github_reviewed": true,
    "github_reviewed_at": "2021-11-17T22:31:03Z"
}
References

Affected packages

Maven / org.apache.shenyu:shenyu-admin

Package

Name
org.apache.shenyu:shenyu-admin
View open source insights on deps.dev
Purl
pkg:maven/org.apache.shenyu/shenyu-admin

Affected ranges

Type
ECOSYSTEM
Events
Introduced
2.3.0
Fixed
2.4.1

Affected versions

2.*

2.4.0