CVE-2021-43116: Use of Hard-coded Credentials in Nacos
8.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.91426%
CWE
Published
7/6/2022
Updated
4/4/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| com.alibaba.nacos:nacos-client | maven | <= 2.0.3 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from Nacos' use of a static JWT signing key (CWE-798). The GitHub issues demonstrate attackers intercepting login responses and forging valid tokens using the default secret. The JwtTokenManager class handles token creation/validation, making these functions vulnerable. While no direct code diffs are provided, the attack pattern and CWE mapping strongly implicate the JWT handling logic as the vulnerable component.