CVE-2023-27584
CRITICAL NUCLEILinuxfoundation Dragonfly < 2.0.9 - Authentication Bypass
Title source: ruleDescription
Dragonfly is an open source P2P-based file distribution and image acceleration system. It is hosted by the Cloud Native Computing Foundation (CNCF) as an Incubating Level Project. Dragonfly uses JWT to verify user. However, the secret key for JWT, "Secret Key", is hard coded, which leads to authentication bypass. An attacker can perform any action as a user with admin privileges. This issue has been addressed in release version 2.0.9. All users are advised to upgrade. There are no known workarounds for this vulnerability.
Nuclei Templates (1)
Dragonfly2 < 2.1.0-beta.1 - Hardcoded JWT Secret
CRITICALVERIFIEDby iamnoooob,rootxharsh,pdresearch
Scores
CVSS v3
9.8
EPSS
0.6618
EPSS Percentile
98.5%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-321
CWE-798
Status
published
Products (2)
dragonfly/v2
2.1.0-alpha.0 - 2.1.0-beta.1Go
linuxfoundation/dragonfly
< 2.0.9
Published
Sep 19, 2024
Tracked Since
Feb 18, 2026