Snyk has a proof-of-concept or detailed explanation of how to exploit this vulnerability.
The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade @nocobase/auth to version 1.9.0-beta.18, 1.9.22, 2.0.0-alpha.52 or higher.
@nocobase/auth is a
Affected versions of this package are vulnerable to Improper Protection for Out of Bounds Signal Level Alerts via the official one-click Docker deployment configuration, a public default JWT key was historically provided.. An attacker can gain unauthorized access to administrative functions and sensitive data by forging valid authentication tokens using a known default secret.
Note: This is only exploitable if the deployment uses the default Docker configuration without explicitly overriding the JWT secret.
This vulnerability can be mitigated by explicitly setting a strong, randomly generated JWT secret via environment variables, restarting all running instances, invalidating all existing JWT sessions, and ensuring no default secret values are present in configuration files or secrets.