CVE-2024-53484

8.8 HIGH

📋 TL;DR

Ever Traduora versions 0.20.0 and below use a hard-coded JWT signing key, allowing attackers to forge authentication tokens and escalate privileges. This affects all deployments of the affected software versions, enabling unauthorized access to administrative functions or sensitive data.

💻 Affected Systems

Products:
  • Ever Traduora
Versions: 0.20.0 and below
Operating Systems: Any OS running Ever Traduora
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations are vulnerable due to the hard-coded key; no specific configuration changes mitigate this.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could forge JWT tokens to gain administrative access, leading to full system compromise, data theft, or unauthorized modifications to translation projects.

🟠

Likely Case

Attackers with network access could escalate privileges to admin levels, potentially accessing or manipulating sensitive translation data and user accounts.

🟢

If Mitigated

With proper network segmentation and access controls, impact may be limited to unauthorized access within the application, but privilege escalation remains possible if exploited.

🌐 Internet-Facing: HIGH, as internet-facing instances are directly accessible to attackers who can exploit the hard-coded key without authentication.
🏢 Internal Only: MEDIUM, as internal attackers or compromised internal systems could exploit this, but requires some level of network access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires knowledge of the hard-coded key and ability to craft JWT tokens, but no public proof-of-concept is confirmed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after 0.20.0 (check for updates in the repository)

Vendor Advisory: https://github.com/ever-co/ever-traduora/issues/431

Restart Required: No

Instructions:

1. Update Ever Traduora to the latest version from the official repository. 2. Replace the hard-coded JWT key with a secure, unique key in the configuration. 3. Rotate all existing JWT tokens to invalidate any forged ones.

🔧 Temporary Workarounds

Manually Change JWT Key

all

Replace the hard-coded JWT signing key with a strong, unique key in the application configuration to prevent token forgery.

Edit the configuration file (e.g., config.json) and set a new JWT_SECRET_KEY value.

🧯 If You Can't Patch

  • Restrict network access to Ever Traduora instances to trusted IPs only.
  • Monitor logs for unusual authentication attempts or privilege escalation activities.

🔍 How to Verify

Check if Vulnerable:

Check the Ever Traduora version; if it is 0.20.0 or below, it is vulnerable. Inspect the configuration for a hard-coded JWT key.

Check Version:

Check the version in the application interface or run a command like `docker inspect ever-traduora` if using Docker.

Verify Fix Applied:

After updating or changing the key, verify that new JWT tokens are signed with the new key and old tokens are rejected.

📡 Detection & Monitoring

Log Indicators:

  • Failed authentication attempts with forged JWT tokens
  • Unusual admin-level access from unexpected IPs or users

Network Indicators:

  • Suspicious JWT token crafting requests to authentication endpoints

SIEM Query:

Example: search for 'JWT' AND 'authentication failure' OR 'privilege escalation' in application logs.

🔗 References

📤 Share & Export