Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-44878

EPSS 0.14% · P33
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2021-44878

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
If an OpenID Connect provider supports the "none" algorithm (i.e., tokens with no signature), pac4j v5.3.0 (and prior) does not refuse it without an explicit configuration on its side or for the "idtoken" response type which is not secure and violates the OpenID Core Specification. The "none" algorithm does not require any signature verification when validating the ID tokens, which allows the attacker to bypass the token validation by injecting a malformed ID token using "none" as the value of "alg" key in the header with an empty signature value.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Pac4j 数据伪造问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Pac4j是一个简单而强大的 Java 安全引擎。用于验证用户、获取他们的配置文件和管理授权,以保护 Web 应用程序和 Web 服务。 Pac4j 中存在数据伪造问题漏洞,该漏洞源于产品在验证ID令牌时未使用有效算法。攻击者可通过该漏洞绕过令牌验证。以下产品及版本受到影响:Pac4j v5.1 版本及之前版本。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2021-44878

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2021-44878

登录查看更多情报信息。

Same Patch Batch · n/a · 2022-01-06 · 35 CVEs total

CVE-2021-461438.1 HIGHExpat 输入验证错误漏洞
CVE-2021-46142Uriparser 资源管理错误漏洞
CVE-2021-44584Emlog 跨站脚本漏洞
CVE-2021-44564Kalkitech Sync Products 加密问题漏洞
CVE-2021-44351NavigateCMS 路径遍历漏洞
CVE-2022-22707lighttpd 缓冲区错误漏洞
CVE-2021-46145Honda-Civic Keyfob System 代码问题漏洞
CVE-2022-22704Zabbix Sia Zabbix 安全漏洞
CVE-2021-46144Roundcube Webmail 跨站脚本漏洞
CVE-2021-46141Uriparser 资源管理错误漏洞
CVE-2021-44590libming 资源管理错误漏洞
CVE-2021-46039GPAC 代码问题漏洞
CVE-2021-46040GPAC 代码问题漏洞
CVE-2021-46041GPAC 安全漏洞
CVE-2021-46042GPAC 代码问题漏洞
CVE-2021-46043GPAC 代码问题漏洞
CVE-2021-46044GPAC 代码问题漏洞
CVE-2021-46071Sourcecodester Vehicle Service Management System 跨站脚本漏洞
CVE-2021-46079Sourcecodester Vehicle Service Management System 代码问题漏洞
CVE-2021-46078Sourcecodester Vehicle Service Management System 代码问题漏洞

Showing top 20 of 35 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2021-44878

No comments yet


Leave a comment