Izanami is a shared configuration service well-suited for micro-service architecture implementation. Attackers can bypass the authentication in this application when deployed using the official Docker image. Because a hard coded secret is used to sign the authentication token (JWT), an attacker could compromise another instance of Izanami. This issue has been patched in version 1.11.0.
Metrics
Affected Vendors & Products
References
History
Mon, 10 Mar 2025 22:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-03-10T21:23:13.652Z
Reserved: 2022-12-29T17:41:28.090Z
Link: CVE-2023-22495

Updated: 2024-08-02T10:13:48.490Z

Status : Modified
Published: 2023-01-14T01:15:15.300
Modified: 2024-11-21T07:44:55.390
Link: CVE-2023-22495

No data.