Izanami is a shared configuration service well-suited for micro-service architecture implementation. Attackers can bypass the authentication in this application when deployed using the official Docker image. Because a hard coded secret is used to sign the authentication token (JWT), an attacker could compromise another instance of Izanami. This issue has been patched in version 1.11.0.
The product requires authentication, but the product has an alternate path or channel that does not require authentication.
The product contains hard-coded credentials, such as a password or cryptographic key.
Link | Tags |
---|---|
https://github.com/MAIF/izanami/security/advisories/GHSA-9r7j-m337-792c | third party advisory exploit |
https://github.com/MAIF/izanami/releases/tag/v1.11.0 | third party advisory release notes |