First published: Wed Oct 25 2023(Updated: )
An issue in Dromara SaToken version 1.3.50RC and before when using Spring dynamic controllers, a specially crafted request may cause an authentication bypass.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Dromara Sa-token | <1.36.0 | |
maven/cn.dev33:sa-token-core | <1.36.0 | 1.36.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-43961 is a vulnerability in Dromara SaToken version 1.3.50RC and earlier versions, which can be exploited to bypass authentication.
This vulnerability can be exploited by sending a specially crafted request to the affected application, which may lead to an authentication bypass.
The severity of CVE-2023-43961 is moderate.
To fix CVE-2023-43961, upgrade to Dromara SaToken version 1.3.50RC or later, specifically version 1.36.0 or higher.
You can find more information about CVE-2023-43961 on the official GitHub page of Dromara Sa-Token and the NIST National Vulnerability Database (NVD).