### [CVE-2021-29441](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29441) ![](https://img.shields.io/static/v1?label=Product&message=nacos&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3C%201.4.1%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-290%20Authentication%20Bypass%20by%20Spoofing&color=brightgreen) ### Description Nacos is a platform designed for dynamic service discovery and configuration and service management. In Nacos before version 1.4.1, when configured to use authentication (-Dnacos.core.auth.enabled=true) Nacos uses the AuthFilter servlet filter to enforce authentication. This filter has a backdoor that enables Nacos servers to bypass this filter and therefore skip authentication checks. This mechanism relies on the user-agent HTTP header so it can be easily spoofed. This issue may allow any user to carry out any administrative tasks on the Nacos server. ### POC #### Reference No PoCs from references. #### Github - https://github.com/12442RF/POC - https://github.com/1f3lse/taiE - https://github.com/20142995/nuclei-templates - https://github.com/20142995/pocsuite3 - https://github.com/ARPSyndicate/cvemon - https://github.com/ARPSyndicate/kenzer-templates - https://github.com/Awrrays/FrameVul - https://github.com/CLincat/vulcat - https://github.com/DMW11525708/wiki - https://github.com/Dghpi9/NacosDefaultToken - https://github.com/Elsfa7-110/kenzer-templates - https://github.com/J1ezds/Vulnerability-Wiki-page - https://github.com/Jeremias215/VulnerabilityManagement - https://github.com/Lern0n/Lernon-POC - https://github.com/NaInSec/CVE-PoC-in-GitHub - https://github.com/Ostorlab/KEV - https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors - https://github.com/SYRTI/POC_to_review - https://github.com/Threekiii/Awesome-Exploit - https://github.com/Threekiii/Awesome-POC - https://github.com/Threekiii/Vulhub-Reproduce - https://github.com/Tsojan/TsojanScan - https://github.com/WhooAmii/POC_to_review - https://github.com/Whoopsunix/nacosScan - https://github.com/XiaomingX/awesome-poc-for-red-team - https://github.com/adysec/POC - https://github.com/azhao1981/CVE-2021-29441 - https://github.com/bakery312/Vulhub-Reproduce - https://github.com/bysinks/CVE-2021-29441 - https://github.com/cc8700619/poc - https://github.com/charonlight/NacosExploitGUI - https://github.com/eeeeeeeeee-code/POC - https://github.com/ffffffff0x/Pentest101 - https://github.com/h0ny/NacosExploit - https://github.com/hh-hunter/nacos-cve-2021-29441 - https://github.com/hktalent/bug-bounty - https://github.com/killvxk/Awesome-Exploit - https://github.com/laoa1573/wy876 - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/oLy0/Vulnerability - https://github.com/soosmile/POC - https://github.com/trhacknon/Pocingit - https://github.com/xK0ng/NacosDefaultToken - https://github.com/xk4ng/NacosDefaultToken - https://github.com/zecool/cve