Description
Crabbox prior to v0.12.0 contains an authentication bypass vulnerability that allows non-admin shared-token callers to impersonate other owners or organizations by spoofing identity headers. Attackers can inject malicious X-Crabbox-Owner and X-Crabbox-Org headers in requests authenticated with a shared token to bypass authorization checks and access owner/org-scoped lease operations belonging to victim accounts.
Problem types
CWE-287 Improper Authentication
Product status
Any version before 0.12.0
b657323f1d1c954cefc8444571fa6c45a8896e7f (git)
Credits
Chia Min Jun Lennon
References
github.com/openclaw/crabbox/releases/tag/v0.12.0
github.com/openclaw/crabbox/pull/70
github.com/...ommit/b657323f1d1c954cefc8444571fa6c45a8896e7f
www.vulncheck.com/...thentication-bypass-via-header-spoofing