Lucene search

K
cveGitHub_MCVE-2024-36111
HistoryJul 25, 2024 - 2:15 p.m.

CVE-2024-36111

2024-07-2514:15:12
CWE-1259
GitHub_M
web.nvd.nist.gov
41
kubepi
k8s panel
jwt token
verification
flaw
security issue
patch

CVSS3

6.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

EPSS

0

Percentile

9.4%

KubePi is a K8s panel. Starting in version 1.6.3 and prior to version 1.8.0, there is a defect in the KubePi JWT token verification. The JWT key in the default configuration file is empty. Although a random 32-bit string will be generated to overwrite the key in the configuration file when the key is detected to be empty in the configuration file reading logic, the key is empty during actual verification. Using an empty key to generate a JWT token can bypass the login verification and directly take over the back end. Version 1.8.0 contains a patch for this issue.

Affected configurations

Vulners
Vulnrichment
Node
1panel-devkubepiRange1.6.31.8.0
VendorProductVersionCPE
1panel-devkubepi*cpe:2.3:a:1panel-dev:kubepi:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "1Panel-dev",
    "product": "KubePi",
    "versions": [
      {
        "version": ">= 1.6.3, < 1.8.0",
        "status": "affected"
      }
    ]
  }
]

CVSS3

6.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

EPSS

0

Percentile

9.4%

Related for CVE-2024-36111