| Title | perfree go-fastdfs-web ≤1.3.7 Hardcoded Apache Shiro Cipher Key |
|---|
| Description | A critical security vulnerability exists in go-fastdfs-web due to the use of a hardcoded AES encryption key in the Apache Shiro RememberMe functionality. This allows unauthenticated remote attackers to craft malicious serialized objects, encrypt them with the known key, and achieve Remote Code Execution (RCE) on the target server. |
|---|
| Source | ⚠️ https://www.notion.so/go-fastdfs-web-Hardcoded-Apache-Shiro-Cipher-Key-reach-RCE-313ea92a3c41806fae44dffe53e69751 |
|---|
| User | din4 (UID 50867) |
|---|
| Submission | 02/26/2026 17:16 (1 month ago) |
|---|
| Moderation | 03/11/2026 13:58 (13 days later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 350392 [perfree go-fastdfs-web up to 1.3.7 Apache Shiro RememberMe ShiroConfig.java rememberMeManager hard-coded key] |
|---|
| Points | 15 |
|---|