Enviar #713990: joey-zhou xiaozhi-esp32-server-java V3.0.0 Improper Authenticationinformación

Títulojoey-zhou xiaozhi-esp32-server-java V3.0.0 Improper Authentication
DescripciónXiaozhi ESP32 Server Java V3.0.0 (the latest version) contains an authentication bypass vulnerability. Attackers can exploit the access whitelist set by the developer to obtain sensitive user information and forge cookies to impersonate any user login. Project address:https://github.com/joey-zhou/xiaozhi-esp32-server-java Scope of impact: Several companies have been found to have deployed this service. The ICO can be used as a fingerprint for searching.
Fuente⚠️ https://github.com/joey-zhou/xiaozhi-esp32-server-java/issues/143
Usuario
 zzdzz (UID 93061)
Sumisión2025-12-12 08:24 (hace 4 meses)
Moderación2025-12-27 10:53 (15 days later)
EstadoAceptado
Entrada de VulDB338513 [joey-zhou xiaozhi-esp32-server-java hasta 3.0.0 Cookie AuthenticationInterceptor.java tryAuthenticateWithCookies autenticación débil]
Puntos20

Want to stay up to date on a daily basis?

Enable the mail alert feature now!