CVE-2023-27583
CVSS V2 None
CVSS V3 None
Description
PanIndex is a network disk directory index. In Panindex prior to version 3.1.3, a hard-coded JWT key `PanIndex` is used. An attacker can use the hard-coded JWT key to sign JWT token and perform any actions as a user with admin privileges. Version 3.1.3 has a patch for the issue. As a workaround, one may change the JWT key in the source code before compiling the project.
Overview
- CVE ID
- CVE-2023-27583
- Assigner
- security-advisories@github.com
- Vulnerability Status
- Analyzed
- Published Version
- 2023-03-13T21:15:14
- Last Modified Date
- 2023-03-17T17:01:00
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:panindex_project:panindex:*:*:*:*:*:*:*:* | 1 | OR | 3.1.3 |
References
Reference URL | Reference Tags |
---|---|
https://github.com/px-org/PanIndex/commit/f7ec0c5739af055ad3a825a20294a5c01ada3302 | Patch |
https://github.com/px-org/PanIndex/releases/tag/v3.1.3 | Release Notes |
https://github.com/px-org/PanIndex/security/advisories/GHSA-82wq-gmw8-g87v | Vendor Advisory |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2023-27583 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27583 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2023-04-17 06:22:31 | Added to TrackCVE | |||
2023-04-17 06:22:35 | Weakness Enumeration | new |