Advisory Database
  • Advisories
  • Dependency Scanning
  1. golang
  2. ›
  3. d7y.io/dragonfly/v2
  4. ›
  5. CVE-2023-27584

CVE-2023-27584: Dragonfly2 has hard coded cyptographic key

September 19, 2024 (updated April 23, 2025)

Hello dragonfly maintainer team, I would like to report a security issue concerning your JWT feature.

References

  • github.com/advisories/GHSA-hpc8-7wpm-889w
  • github.com/dragonflyoss/Dragonfly2
  • github.com/dragonflyoss/Dragonfly2/commit/e9da69dc4048bf2a18a671be94616d85e3429433
  • github.com/dragonflyoss/Dragonfly2/releases/tag/v2.0.9
  • github.com/dragonflyoss/dragonfly/commit/684469a31bd27d38c715c507bca9f6d2c21f9007
  • github.com/dragonflyoss/dragonfly/security/advisories/GHSA-hpc8-7wpm-889w
  • nvd.nist.gov/vuln/detail/CVE-2023-27584

Code Behaviors & Features

Detect and mitigate CVE-2023-27584 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 2.0.9-rc.2, all versions starting from 2.1.0-alpha.0 before 2.1.0-beta.1

Fixed versions

  • 2.1.0-beta.1
  • 2.0.9-rc.2

Solution

Upgrade to versions 2.0.9-rc.2, 2.1.0-beta.1 or above.

Impact 9.8 CRITICAL

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-321: Use of Hard-coded Cryptographic Key
  • CWE-798: Use of Hard-coded Credentials

Source file

go/d7y.io/dragonfly/v2/CVE-2023-27584.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:47 +0000.