| 제목 | Rowboat Labs Rowboat 0.1.67 Authentication Bypass Issues |
|---|
| 설명 |
A critical vulnerability has been identified in Rowboat (version v0.1.67 and prior) within the experimental 'tools_webhook' component. The issue is classified as a JWT "None" Algorithm Attack, which leads to a complete Authentication Bypass (CWE-347/CWE-287).
The vulnerability exists in the Flask-based 'app.py' located in 'apps/experimental/tools_webhook/'. The application's JWT decoding logic fails to enforce a specific cryptographic algorithm. Instead, it respects the "alg" header provided by the client. By supplying a JWT with the "alg" set to "none", an attacker can bypass the signature verification process entirely.
This allows a remote, unauthenticated attacker to craft and submit forged tokens via the 'X-Tools-JWE' header to the '/tool_call' endpoint. By manipulating the "sub" (subject) claim in the unsigned token, the attacker can impersonate any user or service account and execute unauthorized tool commands within the Rowboat environment.
|
|---|
| 원천 | ⚠️ https://github.com/Dave-gilmore-aus/security-advisories/blob/main/rowbat-advisory |
|---|
| 사용자 | davidgilmore (UID 96940) |
|---|
| 제출 | 2026. 03. 31. AM 07:35 (21 날 ago) |
|---|
| 모더레이션 | 2026. 04. 19. PM 09:20 (20 days later) |
|---|
| 상태 | 수락 |
|---|
| VulDB 항목 | 358269 [rowboatlabs rowboat 까지 0.1.67 tools_webhook app.py tool_call X-Tools-JWE 약한 인증] |
|---|
| 포인트들 | 20 |
|---|