| Title | LightPicture LightPicture <=v1.2.2 Authentication bypass |
|---|
| Description | The LightPicture software, in versions up to and including v1.2.2, has an authentication bypass vulnerability due to the use of a fixed JWT key in the TokenVerify.php middleware. This flaw allows an attacker to create an admin-level JWT token by leveraging a script that uses the fixed key. Once the token is generated and set in the localStorage under the name 'lp_token', and the page is refreshed, the attacker gains admin-level access. This issue poses a significant security risk as it can lead to unauthorized access and potential misuse of the application. |
|---|
| Source | ⚠️ https://note.zhaoj.in/share/gKyCbSSdJ5fY |
|---|
| User | glzjin (UID 59815) |
|---|
| Submission | 02/25/2024 05:02 (2 years ago) |
|---|
| Moderation | 02/27/2024 08:27 (2 days later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 254855 [osuuu LightPicture up to 1.2.2 TokenVerify.php handle hard-coded key] |
|---|
| Points | 20 |
|---|