A vulnerability was found in mariazevedo88 travels-java-api up to 5.0.1 and classified as problematic. Affected by this issue is the function doFilterInternal of the file travels-java-api-master\src\main\java\io\github\mariazevedo88\travelsjavaapi\filters\JwtAuthenticationTokenFilter.java of the component JWT Secret Handler. The manipulation leads to use of hard-coded cryptographic key . The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used.
History

Fri, 22 Nov 2024 20:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-798
CPEs cpe:2.3:a:mariazevedo88:travels-java-api:*:*:*:*:*:*:*:*

Wed, 06 Nov 2024 16:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in mariazevedo88 travels-java-api up to 5.0.1 and classified as problematic. Affected by this issue is the function doFilterInternal of the file travels-java-api-master\src\main\java\io\github\mariazevedo88\travelsjavaapi\filters\JwtAuthenticationTokenFilter.java of the component JWT Secret Handler. The manipulation leads to use of hard-coded cryptographic key . The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used.
Title mariazevedo88 travels-java-api JWT Secret JwtAuthenticationTokenFilter.java doFilterInternal hard-coded key
First Time appeared Mariazevedo88
Mariazevedo88 travels-java-api
Weaknesses CWE-320
CWE-321
CPEs cpe:2.3:a:mariazevedo88:travels-java-api:5.0.0:*:*:*:*:*:*:*
cpe:2.3:a:mariazevedo88:travels-java-api:5.0.1:*:*:*:*:*:*:*
Vendors & Products Mariazevedo88
Mariazevedo88 travels-java-api
References
Metrics cvssV2_0

{'score': 2.1, 'vector': 'AV:N/AC:H/Au:S/C:N/I:P/A:N'}

cvssV3_0

{'score': 3.1, 'vector': 'CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N'}

cvssV3_1

{'score': 3.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N'}

cvssV4_0

{'score': 2.3, 'vector': 'CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published: 2024-11-06T16:00:09.086Z

Updated: 2024-11-06T16:09:49.168Z

Reserved: 2024-11-06T10:32:37.985Z

Link: CVE-2024-10920

cve-icon Vulnrichment

Updated: 2024-11-06T16:09:36.867Z

cve-icon NVD

Status : Analyzed

Published: 2024-11-06T16:15:05.930

Modified: 2024-11-22T20:05:52.530

Link: CVE-2024-10920

cve-icon Redhat

No data.