漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
PandaXGO PandaX JWT Secret config.yml hard-coded key
Vulnerability Description
A vulnerability was detected in PandaXGO PandaX up to fb8ff40f7ce5dfebdf66306c6d85625061faf7e5. This affects an unknown function of the file config.yml of the component JWT Secret Handler. The manipulation of the argument key results in use of hard-coded cryptographic key . The attack may be performed from remote. This attack is characterized by high complexity. The exploitability is reported as difficult. The exploit is now public and may be used. This product utilizes a rolling release system for continuous delivery, and as such, version information for affected or updated releases is not disclosed. The project was informed of the problem early through an issue report but has not responded yet.
CVSS Information
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
Vulnerability Type
使用硬编码的密码学密钥
Vulnerability Title
PandaX 安全漏洞
Vulnerability Description
PandaX是PandaX开源的一个 Go 语言开源的企业级物联网平台低代码开发框架。 PandaX存在安全漏洞,该漏洞源于对文件config.yml中参数key的错误操作,可能导致使用硬编码密钥。
CVSS Information
N/A
Vulnerability Type
N/A