Submit #396310: Go-Tribe gotribe None Hard-coded Credentialsinfo

TitleGo-Tribe gotribe None Hard-coded Credentials
Descriptionpkg/token/token.go ```Go var ( config = Config{"Rtg8BPKNEf2mB4mgvKONGPZZQSaJWNLijxR42qRgq0iBb5", "identityKey"} once sync.Once ) ........... ........... // Sign 使用 jwtSecret 签发 token,token 的 claims 中会存放传入的 subject. func Sign(identityKey string) (tokenString string, err error) { // Token 的内容 token := jwt.NewWithClaims(jwt.SigningMethodHS256, jwt.MapClaims{ config.identityKey: identityKey, "nbf": time.Now().Unix(), "iat": time.Now().Unix(), "exp": time.Now().Add(100000 * time.Hour).Unix(), }) // 签发 token tokenString, err = token.SignedString([]byte(config.key)) return } ``` In line 94 of the file 'pkg/token/token.go', hard-coded credentials (config.key) are used. This means that the key is written directly in the code or is provided to the program in some other way (such as a configuration file or environment variable). Hard-coded credentials are a very serious security risk because anyone who has access to the code or configuration can get hold of this key, potentially leading to unauthorized access or action. In addition, if the codebase is compromised or obtained by an attacker, hard-coded keys can also be used to forge legitimate tokens or other sensitive operations.
Source⚠️ https://github.com/Go-Tribe/gotribe/issues/1
User
 zihe (UID 56943)
Submission08/22/2024 10:59 (2 years ago)
Moderation08/23/2024 20:34 (1 day later)
StatusAccepted
VulDB entry275706 [Go-Tribe gotribe up to cd3ccd32cd77852c9ea73f986eaf8c301cfb6310 pkg/token/token.go Sign config.key hard-coded credentials]
Points20

Do you know our Splunk app?

Download it now for free!