提出 #713990: joey-zhou xiaozhi-esp32-server-java V3.0.0 Improper Authentication情報

タイトルjoey-zhou xiaozhi-esp32-server-java V3.0.0 Improper Authentication
説明Xiaozhi ESP32 Server Java V3.0.0 (the latest version) contains an authentication bypass vulnerability. Attackers can exploit the access whitelist set by the developer to obtain sensitive user information and forge cookies to impersonate any user login. Project address:https://github.com/joey-zhou/xiaozhi-esp32-server-java Scope of impact: Several companies have been found to have deployed this service. The ICO can be used as a fingerprint for searching.
ソース⚠️ https://github.com/joey-zhou/xiaozhi-esp32-server-java/issues/143
ユーザー
 zzdzz (UID 93061)
送信2025年12月12日 08:24 (4 月 ago)
モデレーション2025年12月27日 10:53 (15 days later)
ステータス承諾済み
VulDBエントリ338513 [joey-zhou xiaozhi-esp32-server-java 迄 3.0.0 Cookie AuthenticationInterceptor.java tryAuthenticateWithCookies 弱い認証]
ポイント20

Want to know what is going to be exploited?

We predict KEV entries!