Description
A security flaw has been discovered in perfree go-fastdfs-web up to 1.3.7. This affects the function rememberMeManager of the file src/main/java/com/perfree/config/ShiroConfig.java of the component Apache Shiro RememberMe. Performing a manipulation results in use of hard-coded cryptographic key . The attack can be initiated remotely. The complexity of an attack is rather high. The exploitability is reported as difficult. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Problem types
Use of Hard-coded Cryptographic Key
Product status
1.3.1
1.3.2
1.3.3
1.3.4
1.3.5
1.3.6
1.3.7
Timeline
| 2026-03-11: | Advisory disclosed |
| 2026-03-11: | VulDB entry created |
| 2026-03-11: | VulDB entry last update |
Credits
din4 (VulDB User)
VulDB
References
vuldb.com/?id.350392 (VDB-350392 | perfree go-fastdfs-web Apache Shiro RememberMe ShiroConfig.java rememberMeManager hard-coded key)
vuldb.com/?ctiid.350392 (VDB-350392 | CTI Indicators (IOB, IOC, TTP, IOA))
vuldb.com/?submit.768282 (Submit #768282 | perfree go-fastdfs-web ≤1.3.7 Hardcoded Apache Shiro Cipher Key)
www.notion.so/...-reach-RCE-313ea92a3c41806fae44dffe53e69751