Skip to content

EverShop at risk to unauthorized access via weak HMAC secret

High severity GitHub Reviewed Published Jan 13, 2024 to the GitHub Advisory Database • Updated Jan 22, 2024

Package

npm @evershop/evershop (npm)

Affected versions

< 1.0.0-rc.9

Patched versions

1.0.0-rc.9

Description

An issue was discovered in NPM's package @evershop/evershop before version 1.0.0-rc.9. The HMAC secret used for generating tokens is hardcoded as "secret". A weak HMAC secret poses a risk because attackers can use the predictable secret to create valid JSON Web Tokens (JWTs), allowing them access to important information and actions within the application.

References

Published by the National Vulnerability Database Jan 13, 2024
Published to the GitHub Advisory Database Jan 13, 2024
Reviewed Jan 16, 2024
Last updated Jan 22, 2024

Severity

High
7.7
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
High
Privileges required
None
User interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
Low
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L

CVE ID

CVE-2023-46943

GHSA ID

GHSA-32r3-57hp-cgfw
Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.