{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-11619","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2024-11-22T13:02:32.666Z","datePublished":"2024-11-22T21:00:10.761Z","dateUpdated":"2024-11-23T13:28:21.380Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2024-11-22T21:00:10.761Z"},"title":"macrozheng mall JWT Token default key","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-1394","lang":"en","description":"Use of Default Cryptographic Key"}]}],"affected":[{"vendor":"macrozheng","product":"mall","versions":[{"version":"1.0.0","status":"affected"},{"version":"1.0.1","status":"affected"},{"version":"1.0.2","status":"affected"},{"version":"1.0.3","status":"affected"}],"modules":["JWT Token Handler"]}],"descriptions":[{"lang":"en","value":"A vulnerability, which was classified as problematic, has been found in macrozheng mall up to 1.0.3. Affected by this issue is some unknown functionality of the component JWT Token Handler. The manipulation leads to use of default cryptographic key. The complexity of an attack is rather high. The exploitation is known to be difficult. The vendor was contacted early about this disclosure but did not respond in any way. Instead the issue posted on GitHub got deleted without any explanation."},{"lang":"de","value":"Eine problematische Schwachstelle wurde in macrozheng mall bis 1.0.3 entdeckt. Dies betrifft einen unbekannten Teil der Komponente JWT Token Handler. Durch das Manipulieren mit unbekannten Daten kann eine use of default cryptographic key-Schwachstelle ausgenutzt werden. Die Komplexität eines Angriffs ist eher hoch. Sie ist schwierig ausnutzbar."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":2.3,"vectorString":"CVSS:4.0/AV:A/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N","baseSeverity":"LOW"}},{"cvssV3_1":{"version":"3.1","baseScore":5,"vectorString":"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":5,"vectorString":"CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":4.3,"vectorString":"AV:A/AC:H/Au:N/C:P/I:P/A:P"}}],"timeline":[{"time":"2024-11-22T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2024-11-22T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2024-11-22T14:08:16.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"HeddaZhu (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.285842","name":"VDB-285842 | macrozheng mall JWT Token default key","tags":["vdb-entry"]},{"url":"https://vuldb.com/?ctiid.285842","name":"VDB-285842 | CTI Indicators (IOB, IOC)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.444666","name":"Submit #444666 | macrozheng(https://github.com/macrozheng) mall(https://github.com/macrozheng/mall) <=1.0.3 Generation of Incorrect Security Tokens","tags":["third-party-advisory"]},{"url":"https://github.com/macrozheng/mall/issues/880","tags":["issue-tracking"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2024-11619","role":"CISA Coordinator","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"version":"2.0.3","timestamp":"2024-11-23T13:21:00.578663Z"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-11-23T13:28:21.380Z"}}]}}