A vulnerability was found in Juanpao JPShop up to 1.5.02. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file api/config/params.php of the component API. The manipulation of the argument JWT_KEY_ADMIN leads to use of hard-coded cryptographic key . The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The identifier VDB-252997 was assigned to this vulnerability.
The product uses a hard-coded, unchangeable cryptographic key.
Link | Tags |
---|---|
https://vuldb.com/?id.252997 | third party advisory vdb entry technical description |
https://vuldb.com/?ctiid.252997 | signature third party advisory permissions required |
https://vuldb.com/?submit.277418 | third party advisory |
https://note.zhaoj.in/share/XblX1My7jNV7 | broken link exploit |