9.1
CVSSv3

CVE-2022-23944

Published: 25/01/2022 Updated: 01/02/2022
CVSS v2 Base Score: 6.4 | Impact Score: 4.9 | Exploitability Score: 10
CVSS v3 Base Score: 9.1 | Impact Score: 5.2 | Exploitability Score: 3.9
VMScore: 571
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:N

Vulnerability Summary

User can access /plugin api without authentication. This issue affected Apache ShenYu 2.4.0 and 2.4.1.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

apache shenyu 2.4.0

apache shenyu 2.4.1

Mailing Lists

Description: User can access /plugin api without authentication This issue affected Apache ShenYu 240 and 241 -- Zhang Yonglun Apache ShenYu (Incubating) Apache ShardingSphere ...
Severity: moderate Description: Any user can access /plugin API without authentication The project use Shiro to authenticate, but the default WhiteLists are defineded in application include /plugin path So everybody can access /plugin API which will list the details of all plugins include id, name, config (may include password) We can also ad ...
On 1/25/22 03:39, Zhang Yonglun wrote: Thanks for informing oss-security of these issues, but good security announcements have a little more detail, like what actions users or distributors need to take (upgrade to a new version? what version?) and information on where to find more details, like a bug id in your bug tracker If you look at the a ...