제출 #396310: Go-Tribe gotribe None Hard-coded Credentials정보

제목Go-Tribe gotribe None Hard-coded Credentials
설명pkg/token/token.go ```Go var ( config = Config{"Rtg8BPKNEf2mB4mgvKONGPZZQSaJWNLijxR42qRgq0iBb5", "identityKey"} once sync.Once ) ........... ........... // Sign 使用 jwtSecret 签发 token,token 的 claims 中会存放传入的 subject. func Sign(identityKey string) (tokenString string, err error) { // Token 的内容 token := jwt.NewWithClaims(jwt.SigningMethodHS256, jwt.MapClaims{ config.identityKey: identityKey, "nbf": time.Now().Unix(), "iat": time.Now().Unix(), "exp": time.Now().Add(100000 * time.Hour).Unix(), }) // 签发 token tokenString, err = token.SignedString([]byte(config.key)) return } ``` In line 94 of the file 'pkg/token/token.go', hard-coded credentials (config.key) are used. This means that the key is written directly in the code or is provided to the program in some other way (such as a configuration file or environment variable). Hard-coded credentials are a very serious security risk because anyone who has access to the code or configuration can get hold of this key, potentially leading to unauthorized access or action. In addition, if the codebase is compromised or obtained by an attacker, hard-coded keys can also be used to forge legitimate tokens or other sensitive operations.
원천⚠️ https://github.com/Go-Tribe/gotribe/issues/1
사용자
 zihe (UID 56943)
제출2024. 08. 22. AM 10:59 (2 연령 ago)
모더레이션2024. 08. 23. PM 08:34 (1 day later)
상태수락
VulDB 항목275706 [Go-Tribe gotribe 까지 cd3ccd32cd77852c9ea73f986eaf8c301cfb6310 pkg/token/token.go Sign config.key 약한 인증]
포인트들20

Interested in the pricing of exploits?

See the underground prices here!