Lucene search

K
cvelistGitHub_MCVELIST:CVE-2024-36111
HistoryJul 25, 2024 - 1:26 p.m.

CVE-2024-36111 KubePi's JWT token validation has a defect

2024-07-2513:26:13
CWE-1259
GitHub_M
www.cve.org
9
kubepi
jwt token
verification defect
version 1.6.3
version 1.8.0
configuration file
empty key

CVSS3

6.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

EPSS

0

Percentile

9.4%

KubePi is a K8s panel. Starting in version 1.6.3 and prior to version 1.8.0, there is a defect in the KubePi JWT token verification. The JWT key in the default configuration file is empty. Although a random 32-bit string will be generated to overwrite the key in the configuration file when the key is detected to be empty in the configuration file reading logic, the key is empty during actual verification. Using an empty key to generate a JWT token can bypass the login verification and directly take over the back end. Version 1.8.0 contains a patch for this issue.

CNA Affected

[
  {
    "vendor": "1Panel-dev",
    "product": "KubePi",
    "versions": [
      {
        "version": ">= 1.6.3, < 1.8.0",
        "status": "affected"
      }
    ]
  }
]

CVSS3

6.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

EPSS

0

Percentile

9.4%

Related for CVELIST:CVE-2024-36111