| Titre | datavane datavanes <= 1.0.0-SNAPSHOT Improper Authentication |
|---|
| Description | Datavines through the latest version has a JWT authentication bypass vulnerability in TokenManager.java and AuthenticationInterceptor.java. The JWT signing secret is hardcoded as a default value "asdqwe" in @Value("${jwt.token.secret:asdqwe}"), and the configuration key is absent from application.yaml, causing all default deployments to use the same secret. Additionally, AuthenticationInterceptor.preHandle() validates the token password by comparing it against itself (extracted from the same token via tokeManager.getPassword(token)) rather than against the database record, making the password check always pass. An unauthenticated attacker can forge a valid JWT token for any user (including admin) and gain full access to all protected API endpoints without knowing any credentials. |
|---|
| La source | ⚠️ https://github.com/datavane/datavines/issues/580 |
|---|
| Utilisateur | anch0r (UID 96691) |
|---|
| Soumission | 05/04/2026 09:38 (il y a 22 jours) |
|---|
| Modérer | 25/04/2026 12:32 (20 days later) |
|---|
| Statut | Accepté |
|---|
| Entrée VulDB | 359597 [Datavane Datavines JWT Token TokenManager.java tokenSecret chiffrement faible] |
|---|
| Points | 20 |
|---|