QID 730614
QID 730614: Apache Apisix Sensitive Information Disclosure Vulnerability
In Apache APISIX before 3.13.1, the jwt-auth plugin has a security issue that leaks the user's secret key because the error message returned from the dependency lua-resty-jwt contains sensitive information.
Affected Versions:
Apache Apisix versions prior to version 3.13.1
QID Detection Logic (Unauthenticated):
This QID checks for vulnerable Apache Apisix version by sending a HTTP GET request to apisix/admin/tool/version endpoint
An attacker can obtain a plugin-configured secret via an error message response by sending an incorrect JSON Web Token to a route protected by the jwt-auth plugin. The error logic in the dependency library lua-resty-jwt enables sending an RS256 token to an endpoint that requires an HS256 token, with the original secret value included in the error response.
- CVE-2022-29266 -
lists.apache.org/thread/6qpfyxogbvn18g9xr8g218jjfjbfsbhr
CVEs related to QID 730614
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| NA |
|