脆弱性情報
高度な大規模言語モデル技術を使用していますが、出力には不正確または古い情報が含まれる可能性があります。Shenlongはデータの正確性を確保するよう努めていますが、実際の状況に基づいて検証・判断してください。
脆弱性タイトル
OpenList Insecure TLS Default Configuration
脆弱性説明
OpenList Frontend is a UI component for OpenList. Prior to 4.1.10, certificate verification is disabled by default for all storage driver communications. The TlsInsecureSkipVerify setting is default to true in the DefaultConfig() function in internal/conf/config.go. This vulnerability enables Man-in-the-Middle (MitM) attacks by disabling TLS certificate verification, allowing attackers to intercept and manipulate all storage communications. Attackers can exploit this through network-level attacks like ARP spoofing, rogue Wi-Fi access points, or compromised internal network equipment to redirect traffic to malicious endpoints. Since certificate validation is skipped, the system will unknowingly establish encrypted connections with attacker-controlled servers, enabling full decryption, data theft, and manipulation of all storage operations without triggering any security warnings. This vulnerability is fixed in 4.1.10.
CVSS情報
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
脆弱性タイプ
缺失对OpenSSL证书的验证
脆弱性タイトル
OpenList Frontend 安全漏洞
脆弱性説明
OpenList Frontend是OpenList Team开源的一个应用程序,保护开源项目免受基于信任的攻击。 OpenList Frontend 4.1.10之前版本存在安全漏洞,该漏洞源于默认禁用TLS证书验证,可能导致中间人攻击。
CVSS情報
N/A
脆弱性タイプ
N/A