Skip to content

A vulnerability was found in demozx gf_cms 1.0/1.0.1. It...

Moderate severity Unreviewed Published Aug 20, 2024 to the GitHub Advisory Database • Updated Aug 20, 2024

Package

No package listedSuggest a package

Affected versions

Unknown

Patched versions

Unknown

Description

A vulnerability was found in demozx gf_cms 1.0/1.0.1. It has been classified as critical. This affects the function init of the file internal/logic/auth/auth.go of the component JWT Authentication. The manipulation leads to hard-coded credentials. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.0.2 is able to address this issue. The patch is named be702ada7cb6fdabc02689d90b38139c827458a5. It is recommended to upgrade the affected component.

References

Published by the National Vulnerability Database Aug 20, 2024
Published to the GitHub Advisory Database Aug 20, 2024
Last updated Aug 20, 2024

Severity

Moderate

EPSS score

0.249%
(65th percentile)

Weaknesses

CVE ID

CVE-2024-8005

GHSA ID

GHSA-r39x-24mw-vr93

Source code

No known source code

Dependabot alerts are not supported on this advisory because it does not have a package from a supported ecosystem with an affected and fixed version.

Learn more about GitHub language support

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.