Insertion of sensitive information in the centralized (Grafana) logging system in ProLion CryptoSpike 3.0.15P2 allows remote malicious users to impersonate other users in web management and the REST API by reading JWT tokens from logs (as a Granafa authenticated user) or from the Loki REST API without authentication.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
prolion cryptospike 3.0.15 |