NACOS身份认证绕过漏洞

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

------------------------------------ english Hello, my name is threedr3am. I found a security loophole in nacos authentication bypass. After nacos turns on authentication, you can still bypass authentication and access any http interface. By default, nacos needs to modify the application.properties configuration file or add the JVM startup variable -Dnacos.core.auth.enabled=true to enable the authentication function (reference: https://nacos.io/en-us/docs/auth.html) But after turning on the authentication, I found that in the code, the authentication can still be bypassed under certain circumstances and any interface can be called. Through this vulnerability, I can bypass the authentication and do: Call the add user interface, add a new user (`POST https://127.0.0.1:8848/nacos/v1/auth/users?username=test&password=test`), and then use the newly added user to log in to the console to access, modify, and add data. ### 1. Vulnerability details The main sources of vulnerabilities are:...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息