In APache APISIX before 3.13.1, an attacker can obtain a...
High severity
Unreviewed
Published
Apr 21, 2022
to the GitHub Advisory Database
•
Updated Jan 27, 2023
Description
Published by the National Vulnerability Database
Apr 20, 2022
Published to the GitHub Advisory Database
Apr 21, 2022
Last updated
Jan 27, 2023
In APache APISIX before 3.13.1, an attacker can obtain a plugin-configured secret via an error message response by sending an incorrect JSON Web Token to a route protected by the jwt-auth plugin. The error logic in the dependency library lua-resty-jwt enables sending an RS256 token to an endpoint that requires an HS256 token, with the original secret value included in the error response.
References