Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
sealed-env: TOTP secret embedded in unseal token payload (enterprise mode)
Vulnerability Description
sealed-env is a cross-stack, zero-trust secret management library for Node.js and Java/Spring Boot. In sealed-env enterprise mode, versions 0.1.0-alpha.1 through 0.1.0-alpha.3 embedded the operator's literal TOTP secret in the JWS payload of every minted unseal token. JWS payload is base64-encoded JSON, NOT encrypted. Any party who could observe a minted token (CI build logs, container env dumps, kubectl describe pod, Sentry/Rollbar stack traces, log aggregators) could decode the payload and extract the TOTP secret in plaintext. This vulnerability is fixed in 0.1.0-alpha.4.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Vulnerability Type
信息暴露
Vulnerability Title
sealed-env 信息泄露漏洞
Vulnerability Description
sealed-env是David Almeida个人开发者的一个跨平台零信任密钥管理库,支持加密存储与TOTP验证。 sealed-env 0.1.0-alpha.1版本至0.1.0-alpha.3版本存在信息泄露漏洞,该漏洞源于在企业模式下,每个生成的解封令牌的JWS有效载荷中嵌入了操作员的文字TOTP秘密,JWS有效载荷是base64编码的JSON而非加密,任何能观察到令牌的方都能解码有效载荷并以明文提取TOTP秘密。
CVSS Information
N/A
Vulnerability Type
N/A