QID 730614

QID 730614: Apache Apisix Sensitive Information Disclosure Vulnerability

In Apache APISIX before 3.13.1, the jwt-auth plugin has a security issue that leaks the user's secret key because the error message returned from the dependency lua-resty-jwt contains sensitive information.

Affected Versions:
Apache Apisix versions prior to version 3.13.1

QID Detection Logic (Unauthenticated):
This QID checks for vulnerable Apache Apisix version by sending a HTTP GET request to apisix/admin/tool/version endpoint

An attacker can obtain a plugin-configured secret via an error message response by sending an incorrect JSON Web Token to a route protected by the jwt-auth plugin. The error logic in the dependency library lua-resty-jwt enables sending an RS256 token to an endpoint that requires an HS256 token, with the original secret value included in the error response.

  • CVSS V3 rated as High - 7.5 severity.
  • CVSS V2 rated as Medium - 5 severity.
  • Solution
    Vendor has release patch, for more information please refer to Apache Advisory

    CVEs related to QID 730614

    Software Advisories
    Advisory ID Software Component Link
    NA URL Logo lists.apache.org/thread/6qpfyxogbvn18g9xr8g218jjfjbfsbhr