Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <f9c3cbc8-1da9-3903-2e59-bb0e88f2ded5@apache.org>
Date: Tue, 16 Nov 2021 05:14:11 +0000
From: Liang Liu <midnight2104@...che.org>
To: oss-security@...ts.openwall.com
Subject: CVE-2021-37580: Apache ShenYu Admin bypass JWT authentication 

Description:

A flaw was found in Apache ShenYu Admin. The incorrect use of JWT in ShenyuAdminBootstrap allows an attacker to bypass authentication.  This issue affected Apache ShenYu 2.3.0 and 2.4.0

Credit:

This issue was reported by 伍 雄

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.