Files
CVEs-PoC/2021/CVE-2021-29441.md
2025-09-29 21:09:30 +02:00

62 lines
2.9 KiB
Markdown

### [CVE-2021-29441](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29441)
![](https://img.shields.io/static/v1?label=Product&message=nacos&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3C%201.4.1%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-290%20Authentication%20Bypass%20by%20Spoofing&color=brightgreen)
### Description
Nacos is a platform designed for dynamic service discovery and configuration and service management. In Nacos before version 1.4.1, when configured to use authentication (-Dnacos.core.auth.enabled=true) Nacos uses the AuthFilter servlet filter to enforce authentication. This filter has a backdoor that enables Nacos servers to bypass this filter and therefore skip authentication checks. This mechanism relies on the user-agent HTTP header so it can be easily spoofed. This issue may allow any user to carry out any administrative tasks on the Nacos server.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/12442RF/POC
- https://github.com/1f3lse/taiE
- https://github.com/20142995/nuclei-templates
- https://github.com/20142995/pocsuite3
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ARPSyndicate/kenzer-templates
- https://github.com/Awrrays/FrameVul
- https://github.com/CLincat/vulcat
- https://github.com/DMW11525708/wiki
- https://github.com/Dghpi9/NacosDefaultToken
- https://github.com/Elsfa7-110/kenzer-templates
- https://github.com/J1ezds/Vulnerability-Wiki-page
- https://github.com/Jeremias215/VulnerabilityManagement
- https://github.com/Lern0n/Lernon-POC
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/Ostorlab/KEV
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
- https://github.com/SYRTI/POC_to_review
- https://github.com/Threekiii/Awesome-Exploit
- https://github.com/Threekiii/Awesome-POC
- https://github.com/Threekiii/Vulhub-Reproduce
- https://github.com/Tsojan/TsojanScan
- https://github.com/WhooAmii/POC_to_review
- https://github.com/Whoopsunix/nacosScan
- https://github.com/XiaomingX/awesome-poc-for-red-team
- https://github.com/adysec/POC
- https://github.com/azhao1981/CVE-2021-29441
- https://github.com/bakery312/Vulhub-Reproduce
- https://github.com/bysinks/CVE-2021-29441
- https://github.com/cc8700619/poc
- https://github.com/charonlight/NacosExploitGUI
- https://github.com/eeeeeeeeee-code/POC
- https://github.com/ffffffff0x/Pentest101
- https://github.com/h0ny/NacosExploit
- https://github.com/hh-hunter/nacos-cve-2021-29441
- https://github.com/hktalent/bug-bounty
- https://github.com/killvxk/Awesome-Exploit
- https://github.com/laoa1573/wy876
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/oLy0/Vulnerability
- https://github.com/soosmile/POC
- https://github.com/trhacknon/Pocingit
- https://github.com/xK0ng/NacosDefaultToken
- https://github.com/xk4ng/NacosDefaultToken
- https://github.com/zecool/cve