漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
SOCFortress CoPilot: Hardcoded JWT secret allows unauthenticated full admin compromise and lateral movement into all integrated SOC tools
Vulnerability Description
SOCFortress CoPilot focuses on providing a single pane of glass for all your security operations needs. Prior to 0.1.57, SOCFortress CoPilot ships a hardcoded JWT signing secret as a fallback value in backend/app/auth/utils.py:28 and ships it verbatim in .env.example. Any deployment where JWT_SECRET is not explicitly set — including the default Docker Compose setup — signs all authentication tokens with this publicly known value. An unauthenticated attacker can forge arbitrary admin-scoped JWTs and gain full control of the application and every security tool it manages without any credentials. This vulnerability is fixed in 0.1.57.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Vulnerability Type
认证机制不恰当
Vulnerability Title
SOCFortress CoPilot 授权问题漏洞
Vulnerability Description
SOCFortress CoPilot是SOCFortress开源的一个统一安全运维平台。 SOCFortress CoPilot 0.1.57之前版本存在授权问题漏洞,该漏洞源于硬编码的JWT签名密钥作为后备值,且未明确设置JWT_SECRET的部署使用此公开值,可能导致未认证攻击者伪造任意管理员作用域JWT并完全控制应用。
CVSS Information
N/A
Vulnerability Type
N/A