
Cloud Vulnerability DB
A community-led vulnerabilities database
The vulnerability (CVE-2023-22463) affects KubePi versions <=1.6.2, where a hardcoded JWT (JSON Web Token) signing key was discovered in the authentication system. This critical security flaw was disclosed on January 4, 2023, affecting the KubeOperator/kubepi project. The vulnerability allows attackers to forge JWT tokens and potentially gain unauthorized administrator access to any online project (GitHub Advisory).
The vulnerability stems from a hardcoded JwtSigKey in the session.go file with the value 'signature_hmac_secret_shared_key'. This static key was used for JWT token signing and verification across all installations. The vulnerability has been assigned a CVSS v3.1 score of 9.4 (Critical), with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L, indicating network attack vector, low complexity, no privileges required, and no user interaction needed (GitHub Advisory).
The vulnerability allows malicious actors to forge any JWT token and potentially gain unauthorized administrator access to any online KubePi project. This could lead to complete system compromise, as attackers could gain high-level access to confidential data and system controls (GitHub Advisory).
The vulnerability has been patched in version 1.6.3 of KubePi. The fix involves making the JWT key configurable in app.yml, and if left blank, a random key will be generated. Users are strongly recommended to upgrade to version 1.6.3 or later to address this security issue (GitHub Release).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."