제출 #797305: datavane datavanes <= 1.0.0-SNAPSHOT Improper Authentication정보

제목datavane datavanes <= 1.0.0-SNAPSHOT Improper Authentication
설명Datavines through the latest version has a JWT authentication bypass vulnerability in TokenManager.java and AuthenticationInterceptor.java. The JWT signing secret is hardcoded as a default value "asdqwe" in @Value("${jwt.token.secret:asdqwe}"), and the configuration key is absent from application.yaml, causing all default deployments to use the same secret. Additionally, AuthenticationInterceptor.preHandle() validates the token password by comparing it against itself (extracted from the same token via tokeManager.getPassword(token)) rather than against the database record, making the password check always pass. An unauthenticated attacker can forge a valid JWT token for any user (including admin) and gain full access to all protected API endpoints without knowing any credentials.
원천⚠️ https://github.com/datavane/datavines/issues/580
사용자
 anch0r (UID 96691)
제출2026. 04. 05. AM 09:38 (22 날 ago)
모더레이션2026. 04. 25. PM 12:32 (20 days later)
상태수락
VulDB 항목359597 [Datavane Datavines 까지 13607645e14a4982468cfdbcf75c85cde63bae71 JWT Token TokenManager.java tokenSecret 약한 암호화]
포인트들20

Do you want to use VulDB in your project?

Use the official API to access entries easily!