CVE-2024-8005

HIGH

demozx gf_cms <1.0.2 - Hard-coded Credentials

Title source: llm
STIX 2.1

Description

A vulnerability was found in demozx gf_cms 1.0/1.0.1. It has been classified as critical. This affects the function init of the file internal/logic/auth/auth.go of the component JWT Authentication. The manipulation leads to hard-coded credentials. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.0.2 is able to address this issue. The patch is named be702ada7cb6fdabc02689d90b38139c827458a5. It is recommended to upgrade the affected component.

References (7)

Core 7
Core References
Third Party Advisory, VDB Entry vdb-entry technical-description
https://vuldb.com/?id.275199
Permissions Required, Third Party Advisory, VDB Entry signature permissions-required
https://vuldb.com/?ctiid.275199
Third Party Advisory, VDB Entry third-party-advisory
https://vuldb.com/?submit.393981
Issue Tracking exploit issue-tracking
https://github.com/demozx/gf_cms/issues/5

Scores

CVSS v3 7.3
EPSS 0.0036
EPSS Percentile 58.2%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

CISA SSVC

Vulnrichment
Exploitation poc
Automatable yes
Technical Impact partial

Details

CWE
CWE-798
Status published
Products (1)
demozx/gf_cms 1.0 - 1.0.2
Published Aug 20, 2024
Tracked Since Feb 18, 2026