CVE-2022-36672

Novel-Plus v3.6.2 was discovered to contain a hard-coded JWT key located in the project config file. This vulnerability allows attackers to create a custom user session.
References
Link Resource
https://www.mesec.cn/archives/296 Exploit Third Party Advisory
https://www.mesec.cn/archives/296 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:xxyopen:novel-plus:3.6.2:*:*:*:*:*:*:*

History

21 Nov 2024, 07:13

Type Values Removed Values Added
References () https://www.mesec.cn/archives/296 - Exploit, Third Party Advisory () https://www.mesec.cn/archives/296 - Exploit, Third Party Advisory

13 Sep 2023, 19:33

Type Values Removed Values Added
CPE cpe:2.3:a:novel-plus_project:novel-plus:3.6.2:*:*:*:*:*:*:* cpe:2.3:a:xxyopen:novel-plus:3.6.2:*:*:*:*:*:*:*
First Time Xxyopen
Xxyopen novel-plus

Information

Published : 2022-09-01 03:15

Updated : 2024-11-21 07:13


NVD link : CVE-2022-36672

Mitre link : CVE-2022-36672

CVE.ORG link : CVE-2022-36672


JSON object : View

Products Affected

xxyopen

  • novel-plus
CWE
CWE-798

Use of Hard-coded Credentials