漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
hoppscotch Vulnerable to Unauthenticated Onboarding Config Takeover
Vulnerability Description
hoppscotch is an open source API development ecosystem. Prior to version 2026.2.0, an unauthenticated attacker can overwrite the entire infrastructure configuration of a self-hosted Hoppscotch instance including OAuth provider credentials and SMTP settings by sending a single HTTP POST request with no authentication. The endpoint POST /v1/onboarding/config has no authentication guard and performs no check on whether onboarding was already completed. A successful exploit allows the attacker to replace the instance's Google/GitHub/Microsoft OAuth application credentials with their own, causing all subsequent user logins via SSO to authenticate against the attacker's OAuth app. The attacker captures OAuth tokens and email addresses of every user who logs in after the exploit. Additionally, the endpoint returns a recovery token that can be used to read all stored secrets in plaintext, including SMTP passwords and any other configured credentials. Version 2026.2.0 fixes the issue.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Vulnerability Type
访问控制不恰当
Vulnerability Title
Hoppscotch 授权问题漏洞
Vulnerability Description
Hoppscotch是Hoppscotch开源的一个开源 Api 开发生态系统。 Hoppscotch 2026.2.0之前版本存在授权问题漏洞,该漏洞源于未经验证的攻击者可通过单个HTTP POST请求覆盖整个基础设施配置,可能导致OAuth凭据和SMTP密码泄露。
CVSS Information
N/A
Vulnerability Type
N/A