Submit #277418: JPShop JPShop <=1.5.02 Auth-Bypassinfo

TitleJPShop JPShop <=1.5.02 Auth-Bypass
DescriptionThe JPShop application, specifically versions up to and including 1.5.02, is vulnerable to an authentication bypass due to the use of a hardcoded key within the api/config/params.php file. This key is used in conjunction with the TokenFilter.php to generate access tokens. An attacker can exploit this by crafting a malicious token using the fixed key and the provided Python script, which handles the token encoding and decoding process. Once the attacker has the token, it can be used to gain unauthorized access to the admin API endpoints, allowing them to perform actions with administrative privileges.
Source⚠️ https://note.zhaoj.in/share/XblX1My7jNV7
User
 glzjin (UID 59815)
Submission02/04/2024 08:33 AM (10 months ago)
Moderation02/06/2024 09:29 AM (2 days later)
StatusAccepted
VulDB Entry252997 [Juanpao JPShop up to 1.5.02 API api/config/params.php JWT_KEY_ADMIN hard-coded key]
Points20

Might our Artificial Intelligence support you?

Check our Alexa App!