CVE-2023-37266: CasaOS contains weak JWT secrets
9.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.99505%
CWE
Published
7/17/2023
Updated
12/12/2024
KEV Status
No
Technology
Go
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
github.com/IceWhaleTech/CasaOS | go | < 0.4.4 | 0.4.4 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stemmed from two key issues: 1) The JWT validation
used weak credentials (CWE-1391) as shown by the commit switching to ECDSA public key validation
and external key storage. 2) The ExceptLocalhost
middleware created an authentication bypass condition (CWE-287). The commit diff shows these functions were modified to use proper public key validation
and remove IP-based authentication bypass. The original JWT.Validate
implementation likely used HMAC with a weak/static secret, while ExceptLocalhost
's IP-based trust enabled exploitation when combined with header injection.