إرسال #713990: joey-zhou xiaozhi-esp32-server-java V3.0.0 Improper Authenticationالمعلومات

عنوانjoey-zhou xiaozhi-esp32-server-java V3.0.0 Improper Authentication
الوصفXiaozhi ESP32 Server Java V3.0.0 (the latest version) contains an authentication bypass vulnerability. Attackers can exploit the access whitelist set by the developer to obtain sensitive user information and forge cookies to impersonate any user login. Project address:https://github.com/joey-zhou/xiaozhi-esp32-server-java Scope of impact: Several companies have been found to have deployed this service. The ICO can be used as a fingerprint for searching.
المصدر⚠️ https://github.com/joey-zhou/xiaozhi-esp32-server-java/issues/143
المستخدم
 zzdzz (UID 93061)
ارسال12/12/2025 08:24 AM (4 أشهر منذ)
الاعتدال27/12/2025 10:53 AM (15 days later)
الحالةتمت الموافقة
إدخال VulDB338513 [joey-zhou xiaozhi-esp32-server-java حتى 3.0.0 Cookie AuthenticationInterceptor.java tryAuthenticateWithCookies توثيق ضعيف]
النقاط20

Do you need the next level of professionalism?

Upgrade your account now!