Skip to content

Tokenizer vulnerable to client brute-force of token secrets

Moderate severity GitHub Reviewed Published Jul 13, 2023 in superfly/tokenizer • Updated May 20, 2024

Package

gomod github.com/superfly/tokenizer (Go)

Affected versions

< 0.0.1

Patched versions

0.0.1

Description

Impact

Authorized clients, having an inject_processor secret, could brute-force the secret token value by abusing the fmt parameter to the Proxy-Tokenizer header.

Patches

This was fixed in superfly/tokenizer#8 and further mitigated in superfly/tokenizer#9.

References

@btoews btoews published to superfly/tokenizer Jul 13, 2023
Published to the GitHub Advisory Database Jul 13, 2023
Reviewed Jul 13, 2023
Last updated May 20, 2024

Severity

Moderate

EPSS score

Weaknesses

No CWEs

CVE ID

No known CVE

GHSA ID

GHSA-f28g-86hc-823q

Source code

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.