A vulnerability was found in Juanpao JPShop up to 1.5.02. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file api/config/params.php of the component API. The manipulation of the argument JWT_KEY_ADMIN leads to use of hard-coded cryptographic key
. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The identifier VDB-252997 was assigned to this vulnerability.
References
Link | Resource |
---|---|
https://note.zhaoj.in/share/XblX1My7jNV7 | Broken Link |
https://vuldb.com/?ctiid.252997 | Permissions Required Third Party Advisory |
https://vuldb.com/?id.252997 | Third Party Advisory |
https://vuldb.com/?submit.277418 |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: VulDB
Published: 2024-02-06T20:31:03.761Z
Updated: 2024-04-29T11:09:54.704Z
Reserved: 2024-02-06T08:28:36.258Z
Link: CVE-2024-1258
JSON object: View
NVD Information
Status : Modified
Published: 2024-02-06T21:15:08.660
Modified: 2024-05-17T02:35:20.987
Link: CVE-2024-1258
JSON object: View
Redhat Information
No data.
CWE