7.3 HIGH
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): NONE
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): LOW
- Integrity impact (I): LOW
- Availability impact (A): LOW
Activity log
- Created suggestion
Keygraph Shannon Hard-coded Router API Key
Keygraph Shannon contains a hard-coded API key in its router configuration that, when the router component is enabled and exposed, allows network attackers to authenticate using the publicly known static key. An attacker able to reach the router port can proxy requests through the Shannon instance using the victim’s configured upstream provider API credentials, resulting in unauthorized API usage and potential disclosure of proxied request and response data. This vulnerability's general exploitability has been mitigated with the introduction of commit 023cc95.
References
-
https://github.com/KeygraphHQ/shannon/issues/186 issue-tracking
-
https://github.com/KeygraphHQ/shannon/pull/224 release-notes
-
https://www.vulncheck.com/advisories/keygraph-shannon-hard-coded-router-api-key third-party-advisory
Affected products
- <commit 023cc95