Lucene search

K
cvelistGitHub_MCVELIST:CVE-2023-22495
HistoryJan 14, 2023 - 12:47 a.m.

CVE-2023-22495 Izanami is vulnerable to Authorization Bypass

2023-01-1400:47:28
CWE-288
GitHub_M
www.cve.org
izanami
authorization bypass
docker image
authentication
jwt
compromise
patched
version 1.11.0

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.7 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

54.8%

Izanami is a shared configuration service well-suited for micro-service architecture implementation. Attackers can bypass the authentication in this application when deployed using the official Docker image. Because a hard coded secret is used to sign the authentication token (JWT), an attacker could compromise another instance of Izanami. This issue has been patched in version 1.11.0.

CNA Affected

[
  {
    "vendor": "MAIF",
    "product": "izanami",
    "versions": [
      {
        "version": "< 1.11.0",
        "status": "affected"
      }
    ]
  }
]

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.7 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

54.8%

Related for CVELIST:CVE-2023-22495