Vulnerability Details CVE-2023-27583
PanIndex is a network disk directory index. In Panindex prior to version 3.1.3, a hard-coded JWT key `PanIndex` is used. An attacker can use the hard-coded JWT key to sign JWT token and perform any actions as a user with admin privileges. Version 3.1.3 has a patch for the issue. As a workaround, one may change the JWT key in the source code before compiling the project.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.002
EPSS Ranking 43.9%
CVSS Severity
CVSS v3 Score 9.8
Products affected by CVE-2023-27583
-
cpe:2.3:a:panindex_project:panindex:-
-
cpe:2.3:a:panindex_project:panindex:1.0.0
-
cpe:2.3:a:panindex_project:panindex:1.0.1
-
cpe:2.3:a:panindex_project:panindex:1.0.2
-
cpe:2.3:a:panindex_project:panindex:1.0.3
-
cpe:2.3:a:panindex_project:panindex:1.0.4
-
cpe:2.3:a:panindex_project:panindex:1.0.5
-
cpe:2.3:a:panindex_project:panindex:1.0.6
-
cpe:2.3:a:panindex_project:panindex:2.0.0
-
cpe:2.3:a:panindex_project:panindex:2.0.1
-
cpe:2.3:a:panindex_project:panindex:2.0.2
-
cpe:2.3:a:panindex_project:panindex:2.0.3
-
cpe:2.3:a:panindex_project:panindex:2.0.4
-
cpe:2.3:a:panindex_project:panindex:2.0.5
-
cpe:2.3:a:panindex_project:panindex:2.0.6
-
cpe:2.3:a:panindex_project:panindex:2.0.7
-
cpe:2.3:a:panindex_project:panindex:2.0.8
-
cpe:2.3:a:panindex_project:panindex:2.0.9
-
cpe:2.3:a:panindex_project:panindex:3.0.0
-
cpe:2.3:a:panindex_project:panindex:3.0.1
-
cpe:2.3:a:panindex_project:panindex:3.0.2
-
cpe:2.3:a:panindex_project:panindex:3.0.3
-
cpe:2.3:a:panindex_project:panindex:3.0.4
-
cpe:2.3:a:panindex_project:panindex:3.0.5
-
cpe:2.3:a:panindex_project:panindex:3.0.6
-
cpe:2.3:a:panindex_project:panindex:3.0.7
-
cpe:2.3:a:panindex_project:panindex:3.0.8
-
cpe:2.3:a:panindex_project:panindex:3.0.9
-
cpe:2.3:a:panindex_project:panindex:3.1.0
-
cpe:2.3:a:panindex_project:panindex:3.1.1
-
cpe:2.3:a:panindex_project:panindex:3.1.2