CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
98.7%
A flaw was found in Apache ShenYu Admin. The incorrect use of JWT in ShenyuAdminBootstrap allows an attacker to bypass authentication. This issue affected Apache ShenYu 2.3.0 and 2.4.0.
Vendor | Product | Version | CPE |
---|---|---|---|
org.apache.shenyu | shenyu-admin | * | cpe:2.3:a:org.apache.shenyu:shenyu-admin:*:*:*:*:*:*:*:* |
www.openwall.com/lists/oss-security/2021/11/16/1
github.com/advisories/GHSA-vpfp-5gwq-g533
github.com/apache/shenyu/commit/f78adb26926ba53b4ec5c21f2cf7e931461d601d
github.com/apache/shenyu/releases/tag/v2.4.1
lists.apache.org/thread/o15j25qwtpcw62k48xw1tnv48skh3zgb
nvd.nist.gov/vuln/detail/CVE-2021-37580
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
98.7%