Title | JPShop JPShop <=1.5.02 Auth-Bypass |
---|
Description | The JPShop application, specifically versions up to and including 1.5.02, is vulnerable to an authentication bypass due to the use of a hardcoded key within the api/config/params.php file. This key is used in conjunction with the TokenFilter.php to generate access tokens. An attacker can exploit this by crafting a malicious token using the fixed key and the provided Python script, which handles the token encoding and decoding process. Once the attacker has the token, it can be used to gain unauthorized access to the admin API endpoints, allowing them to perform actions with administrative privileges. |
---|
Source | ⚠️ https://note.zhaoj.in/share/XblX1My7jNV7 |
---|
User | glzjin (UID 59815) |
---|
Submission | 02/04/2024 08:33 AM (10 months ago) |
---|
Moderation | 02/06/2024 09:29 AM (2 days later) |
---|
Status | Accepted |
---|
VulDB Entry | 252997 [Juanpao JPShop up to 1.5.02 API api/config/params.php JWT_KEY_ADMIN hard-coded key] |
---|
Points | 20 |
---|