Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
@valtimo/components exposes access token to form.io
Vulnerability Description
Valtimo is an open source business process and case management platform. When opening a form in Valtimo, the access token (JWT) of the user is exposed to `api.form.io` via the the `x-jwt-token` header. An attacker can retrieve personal information from this token, or use it to execute requests to the Valtimo REST API on behalf of the logged-in user. This issue is caused by a misconfiguration of the Form.io component. The following conditions have to be met in order to perform this attack: An attacker needs to have access to the network traffic on the `api.form.io` domain; the content of the `x-jwt-token` header is logged or otherwise available to the attacker; an attacker needs to have network access to the Valtimo API; and an attacker needs to act within the time-to-live of the access token. The default TTL in Keycloak is 5 minutes. Versions 10.8.4, 11.1.6 and 11.2.2 have been patched.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vulnerability Type
通过日志文件的信息暴露
Vulnerability Title
valtimo-frontend-libraries 日志信息泄露漏洞
Vulnerability Description
valtimo-frontend-libraries是Valtimo开源的一个开源业务流程和案例管理平台。 valtimo-frontend-libraries 存在日志信息泄露漏洞,该漏洞源于向 form.io 公开访问令牌,导致攻击者可以检索个人信息,或登录用户执行对 Valtimo REST API 的请求。受影响版本如下:10.8.4之前版本;11.0.0 至 11.1.5版本;11.2.0至11.2.1版本。
CVSS Information
N/A
Vulnerability Type
N/A