CVE-2024-10920

A vulnerability was found in mariazevedo88 travels-java-api up to 5.0.1 and classified as problematic. Affected by this issue is the function doFilterInternal of the file travels-java-api-master\src\main\java\io\github\mariazevedo88\travelsjavaapi\filters\JwtAuthenticationTokenFilter.java of the component JWT Secret Handler. The manipulation leads to use of hard-coded cryptographic key . The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used.
References
Link Resource
https://github.com/mariazevedo88/travels-java-api/issues/23 Exploit Third Party Advisory
https://vuldb.com/?ctiid.283316 Permissions Required
https://vuldb.com/?id.283316 Permissions Required
https://vuldb.com/?submit.433458 Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:mariazevedo88:travels-java-api:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2024-11-06 16:15

Updated : 2024-11-22 20:05


NVD link : CVE-2024-10920

Mitre link : CVE-2024-10920

CVE.ORG link : CVE-2024-10920


JSON object : View

Products Affected

mariazevedo88

  • travels-java-api
CWE
CWE-320

Key Management Errors

CWE-321

Use of Hard-coded Cryptographic Key

CWE-798

Use of Hard-coded Credentials