CVE-2023-22495

Izanami is a shared configuration service well-suited for micro-service architecture implementation. Attackers can bypass the authentication in this application when deployed using the official Docker image. Because a hard coded secret is used to sign the authentication token (JWT), an attacker could compromise another instance of Izanami. This issue has been patched in version 1.11.0.
Configurations

Configuration 1 (hide)

cpe:2.3:a:maif:izanami:*:*:*:*:*:*:*:*

History

21 Nov 2024, 07:44

Type Values Removed Values Added
References () https://github.com/MAIF/izanami/releases/tag/v1.11.0 - Release Notes, Third Party Advisory () https://github.com/MAIF/izanami/releases/tag/v1.11.0 - Release Notes, Third Party Advisory
References () https://github.com/MAIF/izanami/security/advisories/GHSA-9r7j-m337-792c - Exploit, Third Party Advisory () https://github.com/MAIF/izanami/security/advisories/GHSA-9r7j-m337-792c - Exploit, Third Party Advisory
Summary
  • (es) Izanami es un servicio de configuración compartida adecuado para la implementación de arquitectura de microservicios. Los atacantes pueden eludir la autenticación en esta aplicación cuando se implementa utilizando la imagen oficial de Docker. Debido a que se utiliza un secreto codificado para firmar el token de autenticación (JWT), un atacante podría comprometer otra instancia de Izanami. Este problema se solucionó en la versión 1.11.0.

07 Nov 2023, 04:07

Type Values Removed Values Added
Summary Izanami is a shared configuration service well-suited for micro-service architecture implementation. Attackers can bypass the authentication in this application when deployed using the official Docker image. Because a hard coded secret is used to sign the authentication token (JWT), an attacker could compromise another instance of Izanami. This issue has been patched in version 1.11.0. Izanami is a shared configuration service well-suited for micro-service architecture implementation. Attackers can bypass the authentication in this application when deployed using the official Docker image. Because a hard coded secret is used to sign the authentication token (JWT), an attacker could compromise another instance of Izanami. This issue has been patched in version 1.11.0.

Information

Published : 2023-01-14 01:15

Updated : 2024-11-21 07:44


NVD link : CVE-2023-22495

Mitre link : CVE-2023-22495

CVE.ORG link : CVE-2023-22495


JSON object : View

Products Affected

maif

  • izanami
CWE
CWE-288

Authentication Bypass Using an Alternate Path or Channel

CWE-798

Use of Hard-coded Credentials