cve/2022/CVE-2022-29266.md

24 lines
1.1 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2022-29266](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29266)
![](https://img.shields.io/static/v1?label=Product&message=Apache%20APISIX&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=Apache%20APISIX%3C%3D%202.13.0%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information&color=brighgreen)
### Description
In APache APISIX before 3.13.1, the jwt-auth plugin has a security issue that leaks the user's secret key because the error message returned from the dependency lua-resty-jwt contains sensitive information.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/43622283/cloud-security-guides
- https://github.com/ARPSyndicate/cvemon
- https://github.com/GRQForCloud/cloud-security-guides
2024-07-25 21:25:12 +00:00
- https://github.com/Threekiii/Awesome-POC
2024-05-25 21:48:12 +02:00
- https://github.com/YDCloudSecurity/cloud-security-guides
- https://github.com/karimhabush/cyberowl
2024-06-07 04:52:01 +00:00
- https://github.com/teamssix/awesome-cloud-security
2024-05-25 21:48:12 +02:00