1.1K Star 10.9K Fork 4.4K

GVPanji-plus / AJ-Report

 / 详情

Authentication Bypass vulnerability

已完成
创建于  
2022-10-15 11:40

这是英文的漏洞报告,中文的在(This is the English report, the Chinese report is in): 身份验证绕过漏洞

Description

The program uses a fixed JWT key, and the stored Redis key uses username format characters. Any user who has logged in within an hour. JWT Token can be forged with his username to bypass authentication

Login API

com.anjiplus.template.gaea.business.modules.accessuser.controller.AccessUserController#login

输入图片说明

Make redis key of format username, Although uuid is used, uuid is not involved in authentication.

com.anjiplus.template.gaea.business.modules.accessuser.service.impl.AccessUserServiceImpl#login

com.anjiplus.template.gaea.business.constant.BusinessConstant#GAEA_SECURITY_LOGIN_TOKEN

输入图片说明

Uses a fixed JWT secret key

spring-boot-gaea-2.0.5.RELEASE.jar!com.anji.plus.gaea.utils.JwtBean#createToken

spring-boot-gaea-2.0.5.RELEASE.jar!com.anji.plus.gaea.GaeaProperties.Security#getJwtSecret

输入图片说明

TokenFilter for authentication

com.anjiplus.template.gaea.business.filter.TokenFilter#doFilter

输入图片说明

Forge different users' Tokens by modifying the username field

{
    "type": 0,
    "uuid": "",
    "tenant": "tenantCode",
    "username": "admin"
}
eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJ0eXBlIjowLCJ1dWlkIjoiIiwidGVuYW50IjoidGVuYW50Q29kZSIsInVzZXJuYW1lIjoiYWRtaW4ifQ.ce3xqqUypEinA_ZCSky9AptKjkG8qFm8ESMuCunqe6Y

输入图片说明

评论 (0)

JOHNSON 创建了任务
JOHNSON 修改了描述
JOHNSON 修改了描述
JOHNSON 修改了描述
JOHNSON 修改了描述
JOHNSON 修改了描述
JOHNSON 修改了描述
JOHNSON 修改了标题
JOHNSON 修改了标题
JOHNSON 修改了标题
Foming 任务状态待办的 修改为已完成
展开全部操作日志

登录 后才可以发表评论

状态
负责人
里程碑
Pull Requests
关联的 Pull Requests 被合并后可能会关闭此 issue
分支
开始日期   -   截止日期
-
置顶选项
优先级
参与者(1)
1974101 webdjango 1626927187
Java
1
https://gitee.com/anji-plus/report.git
git@gitee.com:anji-plus/report.git
anji-plus
report
AJ-Report

搜索帮助