diff --git a/cves/2021/CVE-2021-37580.yaml b/cves/2021/CVE-2021-37580.yaml index c2b6a2bcbc..2beafdbb70 100644 --- a/cves/2021/CVE-2021-37580.yaml +++ b/cves/2021/CVE-2021-37580.yaml @@ -1,10 +1,10 @@ id: CVE-2021-37580 info: - name: Apache ShenYu Admin JWT authentication bypass + name: Apache ShenYu Admin JWT - Authentication Bypass author: pdteam severity: critical - description: A flaw was found in Apache ShenYu Admin. The incorrect use of JWT in ShenyuAdminBootstrap allows an attacker to bypass authentication. This issue affected Apache ShenYu 2.3.0 and 2.4.0 + description: Apache ShenYu 2.3.0 and 2.4.0 allow Admin access without proper authentication. The incorrect use of JWT in ShenyuAdminBootstrap allows an attacker to bypass authentication. reference: - https://nvd.nist.gov/vuln/detail/CVE-2021-37580 - https://github.com/fengwenhua/CVE-2021-37580 @@ -33,4 +33,6 @@ requests: - type: status status: - - 200 \ No newline at end of file + - 200 + +# Enhanced by mp on 2022/05/02