Vulnerabilites related to strapi - strapi
CVE-2023-22894 (GCVE-0-2023-22894)
Vulnerability from cvelistv5
Published
2023-04-19 00:00
Modified
2025-02-05 16:38
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Strapi through 4.5.5 allows attackers (with access to the admin panel) to discover sensitive user details by exploiting the query filter. The attacker can filter users by columns that contain sensitive information and infer a value from API responses. If the attacker has super admin access, then this can be exploited to discover the password hash and password reset token of all users. If the attacker has admin panel access to an account with permission to access the username and email of API users with a lower privileged role (e.g., Editor or Author), then this can be exploited to discover sensitive information for all API users but not other admin accounts.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:20:31.183Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/strapi/strapi/releases" }, { "tags": [ "x_transferred" ], "url": "https://www.ghostccamm.com/blog/multi_strapi_vulns/" }, { "tags": [ "x_transferred" ], "url": "https://strapi.io/blog/security-disclosure-of-vulnerabilities-cve" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-22894", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-02-05T16:37:12.587306Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-312", "description": "CWE-312 Cleartext Storage of Sensitive Information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-05T16:38:30.797Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Strapi through 4.5.5 allows attackers (with access to the admin panel) to discover sensitive user details by exploiting the query filter. The attacker can filter users by columns that contain sensitive information and infer a value from API responses. If the attacker has super admin access, then this can be exploited to discover the password hash and password reset token of all users. If the attacker has admin panel access to an account with permission to access the username and email of API users with a lower privileged role (e.g., Editor or Author), then this can be exploited to discover sensitive information for all API users but not other admin accounts." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-19T00:00:00.000Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://github.com/strapi/strapi/releases" }, { "url": "https://www.ghostccamm.com/blog/multi_strapi_vulns/" }, { "url": "https://strapi.io/blog/security-disclosure-of-vulnerabilities-cve" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2023-22894", "datePublished": "2023-04-19T00:00:00.000Z", "dateReserved": "2023-01-10T00:00:00.000Z", "dateUpdated": "2025-02-05T16:38:30.797Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-27666 (GCVE-0-2020-27666)
Vulnerability from cvelistv5
Published
2020-10-22 18:19
Modified
2024-08-04 16:18
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Strapi before 3.2.5 has stored XSS in the wysiwyg editor's preview feature.
References
▼ | URL | Tags |
---|---|---|
https://github.com/strapi/strapi/releases/tag/v3.2.5 | x_refsource_MISC | |
https://github.com/strapi/strapi/pull/8440 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T16:18:45.559Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/strapi/strapi/releases/tag/v3.2.5" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/strapi/strapi/pull/8440" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Strapi before 3.2.5 has stored XSS in the wysiwyg editor\u0027s preview feature." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-10-22T18:19:19", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/strapi/strapi/releases/tag/v3.2.5" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/strapi/strapi/pull/8440" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-27666", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Strapi before 3.2.5 has stored XSS in the wysiwyg editor\u0027s preview feature." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/strapi/strapi/releases/tag/v3.2.5", "refsource": "MISC", "url": "https://github.com/strapi/strapi/releases/tag/v3.2.5" }, { "name": "https://github.com/strapi/strapi/pull/8440", "refsource": "MISC", "url": "https://github.com/strapi/strapi/pull/8440" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-27666", "datePublished": "2020-10-22T18:19:19", "dateReserved": "2020-10-22T00:00:00", "dateUpdated": "2024-08-04T16:18:45.559Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-13961 (GCVE-0-2020-13961)
Vulnerability from cvelistv5
Published
2020-06-19 16:29
Modified
2024-08-04 12:32
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Strapi before 3.0.2 could allow a remote authenticated attacker to bypass security restrictions because templates are stored in a global variable without any sanitation. By sending a specially crafted request, an attacker could exploit this vulnerability to update the email template for both password reset and account confirmation emails.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/183045 | x_refsource_MISC | |
https://github.com/strapi/strapi/releases/tag/v3.0.2 | x_refsource_CONFIRM | |
https://github.com/strapi/strapi/pull/6599 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T12:32:14.323Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/183045" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/strapi/strapi/releases/tag/v3.0.2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/strapi/strapi/pull/6599" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2020-06-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Strapi before 3.0.2 could allow a remote authenticated attacker to bypass security restrictions because templates are stored in a global variable without any sanitation. By sending a specially crafted request, an attacker could exploit this vulnerability to update the email template for both password reset and account confirmation emails." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-06-19T16:29:37", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/183045" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/strapi/strapi/releases/tag/v3.0.2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/strapi/strapi/pull/6599" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-13961", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Strapi before 3.0.2 could allow a remote authenticated attacker to bypass security restrictions because templates are stored in a global variable without any sanitation. By sending a specially crafted request, an attacker could exploit this vulnerability to update the email template for both password reset and account confirmation emails." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/183045", "refsource": "MISC", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/183045" }, { "name": "https://github.com/strapi/strapi/releases/tag/v3.0.2", "refsource": "CONFIRM", "url": "https://github.com/strapi/strapi/releases/tag/v3.0.2" }, { "name": "https://github.com/strapi/strapi/pull/6599", "refsource": "CONFIRM", "url": "https://github.com/strapi/strapi/pull/6599" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-13961", "datePublished": "2020-06-19T16:29:37", "dateReserved": "2020-06-08T00:00:00", "dateUpdated": "2024-08-04T12:32:14.323Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-29181 (GCVE-0-2024-29181)
Vulnerability from cvelistv5
Published
2024-06-12 14:46
Modified
2024-08-02 01:10
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-639 - Authorization Bypass Through User-Controlled Key
Summary
Strapi is an open-source content management system. Prior to version 4.19.1, a super admin can create a collection where an item in the collection has an association to another collection. When this happens, another user with Author Role can see the list of associated items they did not create. They should see nothing but their own items they created not all items ever created. Users should upgrade @strapi/plugin-content-manager to version 4.19.1 to receive a patch.
References
▼ | URL | Tags |
---|---|---|
https://github.com/strapi/strapi/security/advisories/GHSA-6j89-frxc-q26m | x_refsource_CONFIRM | |
https://github.com/strapi/strapi/commit/e1dfd4d9f1cab25cf6da3614c1975e4e508e01c6 | x_refsource_MISC |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:strapi:strapi:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "strapi", "vendor": "strapi", "versions": [ { "lessThan": "4.19.1", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-29181", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-06-12T15:34:46.218421Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-12T15:36:12.536Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T01:10:54.079Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/strapi/strapi/security/advisories/GHSA-6j89-frxc-q26m", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/strapi/strapi/security/advisories/GHSA-6j89-frxc-q26m" }, { "name": "https://github.com/strapi/strapi/commit/e1dfd4d9f1cab25cf6da3614c1975e4e508e01c6", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/strapi/strapi/commit/e1dfd4d9f1cab25cf6da3614c1975e4e508e01c6" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "strapi", "vendor": "strapi", "versions": [ { "status": "affected", "version": "\u003c 4.19.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Strapi is an open-source content management system. Prior to version 4.19.1, a super admin can create a collection where an item in the collection has an association to another collection. When this happens, another user with Author Role can see the list of associated items they did not create. They should see nothing but their own items they created not all items ever created. Users should upgrade @strapi/plugin-content-manager to version 4.19.1 to receive a patch." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 2.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-639", "description": "CWE-639: Authorization Bypass Through User-Controlled Key", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-12T14:51:04.145Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/strapi/strapi/security/advisories/GHSA-6j89-frxc-q26m", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/strapi/strapi/security/advisories/GHSA-6j89-frxc-q26m" }, { "name": "https://github.com/strapi/strapi/commit/e1dfd4d9f1cab25cf6da3614c1975e4e508e01c6", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/strapi/strapi/commit/e1dfd4d9f1cab25cf6da3614c1975e4e508e01c6" } ], "source": { "advisory": "GHSA-6j89-frxc-q26m", "discovery": "UNKNOWN" }, "title": "@strapi/plugin-content-manager leaks data via relations via the Admin Panel" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-29181", "datePublished": "2024-06-12T14:46:04.902Z", "dateReserved": "2024-03-18T17:07:00.092Z", "dateUpdated": "2024-08-02T01:10:54.079Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-19609 (GCVE-0-2019-19609)
Vulnerability from cvelistv5
Published
2019-12-05 19:44
Modified
2024-08-05 02:25
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The Strapi framework before 3.0.0-beta.17.8 is vulnerable to Remote Code Execution in the Install and Uninstall Plugin components of the Admin panel, because it does not sanitize the plugin name, and attackers can inject arbitrary shell commands to be executed by the execa function.
References
▼ | URL | Tags |
---|---|---|
https://bittherapy.net/post/strapi-framework-remote-code-execution/ | x_refsource_MISC | |
https://github.com/strapi/strapi/pull/4636 | x_refsource_MISC | |
http://packetstormsecurity.com/files/163950/Strapi-CMS-3.0.0-beta.17.4-Remote-Code-Execution.html | x_refsource_MISC | |
http://packetstormsecurity.com/files/163940/Strapi-3.0.0-beta.17.7-Remote-Code-Execution.html | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T02:25:11.498Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bittherapy.net/post/strapi-framework-remote-code-execution/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/strapi/strapi/pull/4636" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/163950/Strapi-CMS-3.0.0-beta.17.4-Remote-Code-Execution.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/163940/Strapi-3.0.0-beta.17.7-Remote-Code-Execution.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The Strapi framework before 3.0.0-beta.17.8 is vulnerable to Remote Code Execution in the Install and Uninstall Plugin components of the Admin panel, because it does not sanitize the plugin name, and attackers can inject arbitrary shell commands to be executed by the execa function." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-31T16:06:14", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://bittherapy.net/post/strapi-framework-remote-code-execution/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/strapi/strapi/pull/4636" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/163950/Strapi-CMS-3.0.0-beta.17.4-Remote-Code-Execution.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/163940/Strapi-3.0.0-beta.17.7-Remote-Code-Execution.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-19609", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Strapi framework before 3.0.0-beta.17.8 is vulnerable to Remote Code Execution in the Install and Uninstall Plugin components of the Admin panel, because it does not sanitize the plugin name, and attackers can inject arbitrary shell commands to be executed by the execa function." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://bittherapy.net/post/strapi-framework-remote-code-execution/", "refsource": "MISC", "url": "https://bittherapy.net/post/strapi-framework-remote-code-execution/" }, { "name": "https://github.com/strapi/strapi/pull/4636", "refsource": "MISC", "url": "https://github.com/strapi/strapi/pull/4636" }, { "name": "http://packetstormsecurity.com/files/163950/Strapi-CMS-3.0.0-beta.17.4-Remote-Code-Execution.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/163950/Strapi-CMS-3.0.0-beta.17.4-Remote-Code-Execution.html" }, { "name": "http://packetstormsecurity.com/files/163940/Strapi-3.0.0-beta.17.7-Remote-Code-Execution.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/163940/Strapi-3.0.0-beta.17.7-Remote-Code-Execution.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-19609", "datePublished": "2019-12-05T19:44:28", "dateReserved": "2019-12-05T00:00:00", "dateUpdated": "2024-08-05T02:25:11.498Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-27664 (GCVE-0-2020-27664)
Vulnerability from cvelistv5
Published
2020-10-22 18:19
Modified
2024-08-04 16:18
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
admin/src/containers/InputModalStepperProvider/index.js in Strapi before 3.2.5 has unwanted /proxy?url= functionality.
References
▼ | URL | Tags |
---|---|---|
https://github.com/strapi/strapi/releases/tag/v3.2.5 | x_refsource_MISC | |
https://github.com/strapi/strapi/pull/8442 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T16:18:45.677Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/strapi/strapi/releases/tag/v3.2.5" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/strapi/strapi/pull/8442" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "admin/src/containers/InputModalStepperProvider/index.js in Strapi before 3.2.5 has unwanted /proxy?url= functionality." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-10-22T18:19:44", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/strapi/strapi/releases/tag/v3.2.5" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/strapi/strapi/pull/8442" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-27664", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "admin/src/containers/InputModalStepperProvider/index.js in Strapi before 3.2.5 has unwanted /proxy?url= functionality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/strapi/strapi/releases/tag/v3.2.5", "refsource": "MISC", "url": "https://github.com/strapi/strapi/releases/tag/v3.2.5" }, { "name": "https://github.com/strapi/strapi/pull/8442", "refsource": "MISC", "url": "https://github.com/strapi/strapi/pull/8442" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-27664", "datePublished": "2020-10-22T18:19:44", "dateReserved": "2020-10-22T00:00:00", "dateUpdated": "2024-08-04T16:18:45.677Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-0764 (GCVE-0-2022-0764)
Vulnerability from cvelistv5
Published
2022-02-26 14:55
Modified
2024-08-02 23:40
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-78 - Improper Neutralization of Special Elements used in an OS Command
Summary
Arbitrary Command Injection in GitHub repository strapi/strapi prior to 4.1.0.
References
▼ | URL | Tags |
---|---|---|
https://huntr.dev/bounties/001d1c29-805a-4035-93bb-71a0e81da3e5 | x_refsource_CONFIRM | |
https://github.com/strapi/strapi/commit/2a3f5e988be6a2c7dae5ac22b9e86d579b462f4c | x_refsource_MISC | |
https://github.com/strapi/strapi/issues/12879 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
strapi | strapi/strapi |
Version: unspecified < 4.1.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T23:40:03.819Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://huntr.dev/bounties/001d1c29-805a-4035-93bb-71a0e81da3e5" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/strapi/strapi/commit/2a3f5e988be6a2c7dae5ac22b9e86d579b462f4c" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/strapi/strapi/issues/12879" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "strapi/strapi", "vendor": "strapi", "versions": [ { "lessThan": "4.1.0", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Arbitrary Command Injection in GitHub repository strapi/strapi prior to 4.1.0." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:L", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-17T17:12:58", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://huntr.dev/bounties/001d1c29-805a-4035-93bb-71a0e81da3e5" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/strapi/strapi/commit/2a3f5e988be6a2c7dae5ac22b9e86d579b462f4c" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/strapi/strapi/issues/12879" } ], "source": { "advisory": "001d1c29-805a-4035-93bb-71a0e81da3e5", "discovery": "EXTERNAL" }, "title": "Arbitrary Command Injection in strapi/strapi", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@huntr.dev", "ID": "CVE-2022-0764", "STATE": "PUBLIC", "TITLE": "Arbitrary Command Injection in strapi/strapi" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "strapi/strapi", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "4.1.0" } ] } } ] }, "vendor_name": "strapi" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Arbitrary Command Injection in GitHub repository strapi/strapi prior to 4.1.0." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:L", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-78 Improper Neutralization of Special Elements used in an OS Command" } ] } ] }, "references": { "reference_data": [ { "name": "https://huntr.dev/bounties/001d1c29-805a-4035-93bb-71a0e81da3e5", "refsource": "CONFIRM", "url": "https://huntr.dev/bounties/001d1c29-805a-4035-93bb-71a0e81da3e5" }, { "name": "https://github.com/strapi/strapi/commit/2a3f5e988be6a2c7dae5ac22b9e86d579b462f4c", "refsource": "MISC", "url": "https://github.com/strapi/strapi/commit/2a3f5e988be6a2c7dae5ac22b9e86d579b462f4c" }, { "name": "https://github.com/strapi/strapi/issues/12879", "refsource": "MISC", "url": "https://github.com/strapi/strapi/issues/12879" } ] }, "source": { "advisory": "001d1c29-805a-4035-93bb-71a0e81da3e5", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2022-0764", "datePublished": "2022-02-26T14:55:09", "dateReserved": "2022-02-25T00:00:00", "dateUpdated": "2024-08-02T23:40:03.819Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-30617 (GCVE-0-2022-30617)
Vulnerability from cvelistv5
Published
2022-05-19 17:07
Modified
2024-08-03 06:56
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-212 - Improper Removal of Sensitive Information Before Storage or Transfer
Summary
An authenticated user with access to the Strapi admin panel can view private and sensitive data, such as email and password reset tokens, for other admin panel users that have a relationship (e.g., created by, updated by) with content accessible to the authenticated user. For example, a low-privileged “author” role account can view these details in the JSON response for an “editor” or “super admin” that has updated one of the author’s blog posts. There are also many other scenarios where such details from other users can leak in the JSON response, either through a direct or indirect relationship. Access to this information enables a user to compromise other users’ accounts by successfully invoking the password reset workflow. In a worst-case scenario, a low-privileged user could get access to a “super admin” account with full control over the Strapi instance, and could read and modify any data as well as block access to both the admin panel and API by revoking privileges for all other users.
References
▼ | URL | Tags |
---|---|---|
https://www.synopsys.com/blogs/software-security/cyrc-advisory-strapi | x_refsource_MISC |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T06:56:12.964Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.synopsys.com/blogs/software-security/cyrc-advisory-strapi" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Strapi", "vendor": "Strapi", "versions": [ { "status": "affected", "version": "\u003c 3.6.9" }, { "status": "affected", "version": "! 4.0.0" }, { "status": "affected", "version": "\u003c 4.0.0-beta.16" } ] } ], "descriptions": [ { "lang": "en", "value": "An authenticated user with access to the Strapi admin panel can view private and sensitive data, such as email and password reset tokens, for other admin panel users that have a relationship (e.g., created by, updated by) with content accessible to the authenticated user. For example, a low-privileged \u201cauthor\u201d role account can view these details in the JSON response for an \u201ceditor\u201d or \u201csuper admin\u201d that has updated one of the author\u2019s blog posts. There are also many other scenarios where such details from other users can leak in the JSON response, either through a direct or indirect relationship. Access to this information enables a user to compromise other users\u2019 accounts by successfully invoking the password reset workflow. In a worst-case scenario, a low-privileged user could get access to a \u201csuper admin\u201d account with full control over the Strapi instance, and could read and modify any data as well as block access to both the admin panel and API by revoking privileges for all other users." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-212", "description": "CWE-212 Improper Removal of Sensitive Information Before Storage or Transfer", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-19T17:07:36", "orgId": "8cad7728-009c-4a3d-a95e-ca62e6ff8a0b", "shortName": "SNPS" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.synopsys.com/blogs/software-security/cyrc-advisory-strapi" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "disclosure@synopsys.com", "ID": "CVE-2022-30617", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Strapi", "version": { "version_data": [ { "version_value": "\u003c 3.6.9" }, { "version_value": "! 4.0.0" }, { "version_value": "\u003c 4.0.0-beta.16" } ] } } ] }, "vendor_name": "Strapi" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An authenticated user with access to the Strapi admin panel can view private and sensitive data, such as email and password reset tokens, for other admin panel users that have a relationship (e.g., created by, updated by) with content accessible to the authenticated user. For example, a low-privileged \u201cauthor\u201d role account can view these details in the JSON response for an \u201ceditor\u201d or \u201csuper admin\u201d that has updated one of the author\u2019s blog posts. There are also many other scenarios where such details from other users can leak in the JSON response, either through a direct or indirect relationship. Access to this information enables a user to compromise other users\u2019 accounts by successfully invoking the password reset workflow. In a worst-case scenario, a low-privileged user could get access to a \u201csuper admin\u201d account with full control over the Strapi instance, and could read and modify any data as well as block access to both the admin panel and API by revoking privileges for all other users." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-212 Improper Removal of Sensitive Information Before Storage or Transfer" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.synopsys.com/blogs/software-security/cyrc-advisory-strapi", "refsource": "MISC", "url": "https://www.synopsys.com/blogs/software-security/cyrc-advisory-strapi" } ] } } } }, "cveMetadata": { "assignerOrgId": "8cad7728-009c-4a3d-a95e-ca62e6ff8a0b", "assignerShortName": "SNPS", "cveId": "CVE-2022-30617", "datePublished": "2022-05-19T17:07:36", "dateReserved": "2022-05-12T00:00:00", "dateUpdated": "2024-08-03T06:56:12.964Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-31217 (GCVE-0-2024-31217)
Vulnerability from cvelistv5
Published
2024-06-12 14:50
Modified
2024-08-02 01:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-248 - Uncaught Exception
Summary
Strapi is an open-source content management system. Prior to version 4.22.0, a denial-of-service vulnerability is present in the media upload process causing the server to crash without restarting, affecting either development and production environments. Usually, errors in the application cause it to log the error and keep it running for other clients. This behavior, in contrast, stops the server execution, making it unavailable for any clients until it's manually restarted. Any user with access to the file upload functionality is able to exploit this vulnerability, affecting applications running in both development mode and production mode as well. Users should upgrade @strapi/plugin-upload to version 4.22.0 to receive a patch.
References
▼ | URL | Tags |
---|---|---|
https://github.com/strapi/strapi/security/advisories/GHSA-pm9q-xj9p-96pm | x_refsource_CONFIRM | |
https://github.com/strapi/strapi/commit/a0da7e73e1496d835fe71a2febb14f70170135c7 | x_refsource_MISC |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:strapi:strapi:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "strapi", "vendor": "strapi", "versions": [ { "lessThan": "4.22.0", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-31217", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-06-12T15:53:55.205861Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-12T15:55:51.664Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T01:46:04.759Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/strapi/strapi/security/advisories/GHSA-pm9q-xj9p-96pm", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/strapi/strapi/security/advisories/GHSA-pm9q-xj9p-96pm" }, { "name": "https://github.com/strapi/strapi/commit/a0da7e73e1496d835fe71a2febb14f70170135c7", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/strapi/strapi/commit/a0da7e73e1496d835fe71a2febb14f70170135c7" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "strapi", "vendor": "strapi", "versions": [ { "status": "affected", "version": "\u003c 4.22.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Strapi is an open-source content management system. Prior to version 4.22.0, a denial-of-service vulnerability is present in the media upload process causing the server to crash without restarting, affecting either development and production environments. Usually, errors in the application cause it to log the error and keep it running for other clients. This behavior, in contrast, stops the server execution, making it unavailable for any clients until it\u0027s manually restarted. Any user with access to the file upload functionality is able to exploit this vulnerability, affecting applications running in both development mode and production mode as well. Users should upgrade @strapi/plugin-upload to version 4.22.0 to receive a patch.\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-248", "description": "CWE-248: Uncaught Exception", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-12T14:50:37.999Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/strapi/strapi/security/advisories/GHSA-pm9q-xj9p-96pm", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/strapi/strapi/security/advisories/GHSA-pm9q-xj9p-96pm" }, { "name": "https://github.com/strapi/strapi/commit/a0da7e73e1496d835fe71a2febb14f70170135c7", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/strapi/strapi/commit/a0da7e73e1496d835fe71a2febb14f70170135c7" } ], "source": { "advisory": "GHSA-pm9q-xj9p-96pm", "discovery": "UNKNOWN" }, "title": "@strapi/plugin-upload has a Denial-of-Service via Improper Exception Handling" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-31217", "datePublished": "2024-06-12T14:50:37.999Z", "dateReserved": "2024-03-29T14:16:31.901Z", "dateUpdated": "2024-08-02T01:46:04.759Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-22893 (GCVE-0-2023-22893)
Vulnerability from cvelistv5
Published
2023-04-19 00:00
Modified
2025-02-05 16:41
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Strapi through 4.5.5 does not verify the access or ID tokens issued during the OAuth flow when the AWS Cognito login provider is used for authentication. A remote attacker could forge an ID token that is signed using the 'None' type algorithm to bypass authentication and impersonate any user that use AWS Cognito for authentication.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:20:31.123Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/strapi/strapi/releases" }, { "tags": [ "x_transferred" ], "url": "https://www.ghostccamm.com/blog/multi_strapi_vulns/" }, { "tags": [ "x_transferred" ], "url": "https://strapi.io/blog/security-disclosure-of-vulnerabilities-cve" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-22893", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-02-05T16:39:39.563142Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-287", "description": "CWE-287 Improper Authentication", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-05T16:41:30.051Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Strapi through 4.5.5 does not verify the access or ID tokens issued during the OAuth flow when the AWS Cognito login provider is used for authentication. A remote attacker could forge an ID token that is signed using the \u0027None\u0027 type algorithm to bypass authentication and impersonate any user that use AWS Cognito for authentication." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-19T00:00:00.000Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://github.com/strapi/strapi/releases" }, { "url": "https://www.ghostccamm.com/blog/multi_strapi_vulns/" }, { "url": "https://strapi.io/blog/security-disclosure-of-vulnerabilities-cve" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2023-22893", "datePublished": "2023-04-19T00:00:00.000Z", "dateReserved": "2023-01-10T00:00:00.000Z", "dateUpdated": "2025-02-05T16:41:30.051Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-34093 (GCVE-0-2023-34093)
Vulnerability from cvelistv5
Published
2023-07-25 14:54
Modified
2024-10-03 20:03
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-200 - Exposure of Sensitive Information to an Unauthorized Actor
Summary
Strapi is an open-source headless content management system. Prior to version 4.10.8, anyone (Strapi developers, users, plugins) can make every attribute of a Content-Type public without knowing it. The vulnerability only affects the handling of content types by Strapi, not the actual content types themselves. Users can use plugins or modify their own content types without realizing that the `privateAttributes` getter is being removed, which can result in any attribute becoming public. This can lead to sensitive information being exposed or the entire system being taken control of by an attacker(having access to password hashes). Anyone can be impacted, depending on how people are using/extending content-types. If the users are mutating the content-type, they will not be affected. Version 4.10.8 contains a patch for this issue.
References
▼ | URL | Tags |
---|---|---|
https://github.com/strapi/strapi/security/advisories/GHSA-chmr-rg2f-9jmf | x_refsource_CONFIRM | |
https://github.com/strapi/strapi/commit/2fa8f30371bfd1db44c15e5747860ee5789096de | x_refsource_MISC | |
https://github.com/strapi/strapi/releases/tag/v4.10.8 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T16:01:53.662Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/strapi/strapi/security/advisories/GHSA-chmr-rg2f-9jmf", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/strapi/strapi/security/advisories/GHSA-chmr-rg2f-9jmf" }, { "name": "https://github.com/strapi/strapi/commit/2fa8f30371bfd1db44c15e5747860ee5789096de", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/strapi/strapi/commit/2fa8f30371bfd1db44c15e5747860ee5789096de" }, { "name": "https://github.com/strapi/strapi/releases/tag/v4.10.8", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/strapi/strapi/releases/tag/v4.10.8" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:strapi:strapi:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "strapi", "vendor": "strapi", "versions": [ { "lessThan": "4.10.8", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-34093", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-03T20:03:21.501296Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-03T20:03:57.103Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "strapi", "vendor": "strapi", "versions": [ { "status": "affected", "version": "\u003c 4.10.8" } ] } ], "descriptions": [ { "lang": "en", "value": "Strapi is an open-source headless content management system. Prior to version 4.10.8, anyone (Strapi developers, users, plugins) can make every attribute of a Content-Type public without knowing it. The vulnerability only affects the handling of content types by Strapi, not the actual content types themselves. Users can use plugins or modify their own content types without realizing that the `privateAttributes` getter is being removed, which can result in any attribute becoming public. This can lead to sensitive information being exposed or the entire system being taken control of by an attacker(having access to password hashes). Anyone can be impacted, depending on how people are using/extending content-types. If the users are mutating the content-type, they will not be affected. Version 4.10.8 contains a patch for this issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-25T14:54:42.434Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/strapi/strapi/security/advisories/GHSA-chmr-rg2f-9jmf", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/strapi/strapi/security/advisories/GHSA-chmr-rg2f-9jmf" }, { "name": "https://github.com/strapi/strapi/commit/2fa8f30371bfd1db44c15e5747860ee5789096de", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/strapi/strapi/commit/2fa8f30371bfd1db44c15e5747860ee5789096de" }, { "name": "https://github.com/strapi/strapi/releases/tag/v4.10.8", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/strapi/strapi/releases/tag/v4.10.8" } ], "source": { "advisory": "GHSA-chmr-rg2f-9jmf", "discovery": "UNKNOWN" }, "title": "Strapi allows actors to make all attributes on a content-type public without noticing it" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-34093", "datePublished": "2023-07-25T14:54:42.434Z", "dateReserved": "2023-05-25T21:56:51.244Z", "dateUpdated": "2024-10-03T20:03:57.103Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-27263 (GCVE-0-2022-27263)
Vulnerability from cvelistv5
Published
2022-04-12 16:29
Modified
2024-08-03 05:25
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
An arbitrary file upload vulnerability in the file upload module of Strapi v4.1.5 allows attackers to execute arbitrary code via a crafted file.
References
▼ | URL | Tags |
---|---|---|
https://github.com/strapi/strapi | x_refsource_MISC | |
https://www.youtube.com/watch?v=LEeabouqRrg | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:25:32.326Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/strapi/strapi" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.youtube.com/watch?v=LEeabouqRrg" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An arbitrary file upload vulnerability in the file upload module of Strapi v4.1.5 allows attackers to execute arbitrary code via a crafted file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-12T16:29:02", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/strapi/strapi" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.youtube.com/watch?v=LEeabouqRrg" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2022-27263", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An arbitrary file upload vulnerability in the file upload module of Strapi v4.1.5 allows attackers to execute arbitrary code via a crafted file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/strapi/strapi", "refsource": "MISC", "url": "https://github.com/strapi/strapi" }, { "name": "https://www.youtube.com/watch?v=LEeabouqRrg", "refsource": "MISC", "url": "https://www.youtube.com/watch?v=LEeabouqRrg" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2022-27263", "datePublished": "2022-04-12T16:29:02", "dateReserved": "2022-03-21T00:00:00", "dateUpdated": "2024-08-03T05:25:32.326Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-36472 (GCVE-0-2023-36472)
Vulnerability from cvelistv5
Published
2023-09-15 18:54
Modified
2024-09-25 15:00
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-200 - Exposure of Sensitive Information to an Unauthorized Actor
Summary
Strapi is an open-source headless content management system. Prior to version 4.11.7, an unauthorized actor can get access to user reset password tokens if they have the configure view permissions. The `/content-manager/relations` route does not remove private fields or ensure that they can't be selected. This issue is fixed in version 4.11.7.
References
▼ | URL | Tags |
---|---|---|
https://github.com/strapi/strapi/security/advisories/GHSA-v8gg-4mq2-88q4 | x_refsource_CONFIRM | |
https://github.com/strapi/strapi/releases/tag/v4.11.7 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T16:45:56.648Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/strapi/strapi/security/advisories/GHSA-v8gg-4mq2-88q4", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/strapi/strapi/security/advisories/GHSA-v8gg-4mq2-88q4" }, { "name": "https://github.com/strapi/strapi/releases/tag/v4.11.7", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/strapi/strapi/releases/tag/v4.11.7" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-36472", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-25T15:00:22.179988Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-25T15:00:46.751Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "strapi", "vendor": "strapi", "versions": [ { "status": "affected", "version": "\u003c 4.11.7" } ] } ], "descriptions": [ { "lang": "en", "value": "Strapi is an open-source headless content management system. Prior to version 4.11.7, an unauthorized actor can get access to user reset password tokens if they have the configure view permissions. The `/content-manager/relations` route does not remove private fields or ensure that they can\u0027t be selected. This issue is fixed in version 4.11.7." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-19T16:39:09.135Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/strapi/strapi/security/advisories/GHSA-v8gg-4mq2-88q4", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/strapi/strapi/security/advisories/GHSA-v8gg-4mq2-88q4" }, { "name": "https://github.com/strapi/strapi/releases/tag/v4.11.7", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/strapi/strapi/releases/tag/v4.11.7" } ], "source": { "advisory": "GHSA-v8gg-4mq2-88q4", "discovery": "UNKNOWN" }, "title": "Strapi may leak sensitive user information, user reset password, tokens via content-manager views" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-36472", "datePublished": "2023-09-15T18:54:34.072Z", "dateReserved": "2023-06-21T18:50:41.702Z", "dateUpdated": "2024-09-25T15:00:46.751Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-31367 (GCVE-0-2022-31367)
Vulnerability from cvelistv5
Published
2022-09-27 13:02
Modified
2025-05-22 13:50
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Strapi before 3.6.10 and 4.x before 4.1.10 mishandles hidden attributes within admin API responses.
References
▼ | URL | Tags |
---|---|---|
https://github.com/strapi/strapi/releases/tag/v4.1.10 | x_refsource_MISC | |
https://github.com/strapi/strapi/releases/tag/v3.6.10 | x_refsource_MISC | |
https://github.com/kos0ng/CVEs/tree/main/CVE-2022-31367 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:19:05.647Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/strapi/strapi/releases/tag/v4.1.10" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/strapi/strapi/releases/tag/v3.6.10" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/kos0ng/CVEs/tree/main/CVE-2022-31367" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-31367", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-05-22T13:50:00.573719Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-89", "description": "CWE-89 Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-22T13:50:07.048Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Strapi before 3.6.10 and 4.x before 4.1.10 mishandles hidden attributes within admin API responses." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-27T17:44:21.000Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/strapi/strapi/releases/tag/v4.1.10" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/strapi/strapi/releases/tag/v3.6.10" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/kos0ng/CVEs/tree/main/CVE-2022-31367" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2022-31367", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Strapi before 3.6.10 and 4.x before 4.1.10 mishandles hidden attributes within admin API responses." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/strapi/strapi/releases/tag/v4.1.10", "refsource": "MISC", "url": "https://github.com/strapi/strapi/releases/tag/v4.1.10" }, { "name": "https://github.com/strapi/strapi/releases/tag/v3.6.10", "refsource": "MISC", "url": "https://github.com/strapi/strapi/releases/tag/v3.6.10" }, { "name": "https://github.com/kos0ng/CVEs/tree/main/CVE-2022-31367", "refsource": "MISC", "url": "https://github.com/kos0ng/CVEs/tree/main/CVE-2022-31367" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2022-31367", "datePublished": "2022-09-27T13:02:41.000Z", "dateReserved": "2022-05-23T00:00:00.000Z", "dateUpdated": "2025-05-22T13:50:07.048Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-37818 (GCVE-0-2024-37818)
Vulnerability from cvelistv5
Published
2024-06-20 00:00
Modified
2024-10-04 18:52
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Strapi v4.24.4 was discovered to contain a Server-Side Request Forgery (SSRF) via the component /strapi.io/_next/image. This vulnerability allows attackers to scan for open ports or access sensitive information via a crafted GET request. NOTE: The Strapi Development Community argues that this issue is not valid. They contend that "the strapi/admin was wrongly attributed a flaw that only pertains to the strapi.io website, and which, at the end of the day, does not pose any real SSRF risk to applications that make use of the Strapi library."
References
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:strapi:strapi:4.24.4:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "strapi", "vendor": "strapi", "versions": [ { "status": "affected", "version": "4.24.4" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-37818", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-25T17:46:13.770382Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-918", "description": "CWE-918 Server-Side Request Forgery (SSRF)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-26T16:09:03.203Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T03:57:39.785Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://strapi.io/" }, { "tags": [ "x_transferred" ], "url": "https://medium.com/%40barkadevaibhav491/server-side-request-forgery-in-strapi-e02d5fe218ab" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Strapi v4.24.4 was discovered to contain a Server-Side Request Forgery (SSRF) via the component /strapi.io/_next/image. This vulnerability allows attackers to scan for open ports or access sensitive information via a crafted GET request. NOTE: The Strapi Development Community argues that this issue is not valid. They contend that \"the strapi/admin was wrongly attributed a flaw that only pertains to the strapi.io website, and which, at the end of the day, does not pose any real SSRF risk to applications that make use of the Strapi library.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-04T18:52:23.687581", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://strapi.io/" }, { "url": "https://medium.com/%40barkadevaibhav491/server-side-request-forgery-in-strapi-e02d5fe218ab" } ], "tags": [ "disputed" ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2024-37818", "datePublished": "2024-06-20T00:00:00", "dateReserved": "2024-06-10T00:00:00", "dateUpdated": "2024-10-04T18:52:23.687581", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-37263 (GCVE-0-2023-37263)
Vulnerability from cvelistv5
Published
2023-09-15 18:57
Modified
2024-09-25 14:58
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-200 - Exposure of Sensitive Information to an Unauthorized Actor
Summary
Strapi is the an open-source headless content management system. Prior to version 4.12.1, field level permissions are not respected in the relationship title. If an actor has relationship title and the relationship shows a field they don't have permission to see, the field will still be visible. Version 4.12.1 has a fix for this issue.
References
▼ | URL | Tags |
---|---|---|
https://github.com/strapi/strapi/security/advisories/GHSA-m284-85mf-cgrc | x_refsource_CONFIRM | |
https://github.com/strapi/strapi/releases/tag/v4.12.1 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T17:09:33.930Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/strapi/strapi/security/advisories/GHSA-m284-85mf-cgrc", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/strapi/strapi/security/advisories/GHSA-m284-85mf-cgrc" }, { "name": "https://github.com/strapi/strapi/releases/tag/v4.12.1", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/strapi/strapi/releases/tag/v4.12.1" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-37263", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-25T14:58:02.647197Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "CWE-400 Uncontrolled Resource Consumption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-25T14:58:52.828Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "strapi", "vendor": "strapi", "versions": [ { "status": "affected", "version": "\u003c 4.12.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Strapi is the an open-source headless content management system. Prior to version 4.12.1, field level permissions are not respected in the relationship title. If an actor has relationship title and the relationship shows a field they don\u0027t have permission to see, the field will still be visible. Version 4.12.1 has a fix for this issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-15T18:57:09.623Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/strapi/strapi/security/advisories/GHSA-m284-85mf-cgrc", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/strapi/strapi/security/advisories/GHSA-m284-85mf-cgrc" }, { "name": "https://github.com/strapi/strapi/releases/tag/v4.12.1", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/strapi/strapi/releases/tag/v4.12.1" } ], "source": { "advisory": "GHSA-m284-85mf-cgrc", "discovery": "UNKNOWN" }, "title": "Strapi\u0027s field level permissions not being respected in relationship title" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-37263", "datePublished": "2023-09-15T18:57:09.623Z", "dateReserved": "2023-06-29T19:35:26.437Z", "dateUpdated": "2024-09-25T14:58:52.828Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-52588 (GCVE-0-2024-52588)
Vulnerability from cvelistv5
Published
2025-05-29 09:02
Modified
2025-05-29 13:44
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-918 - Server-Side Request Forgery (SSRF)
Summary
Strapi is an open-source content management system. Prior to version 4.25.2, inputting a local domain into the Webhooks URL field leads to the application fetching itself, resulting in a server side request forgery (SSRF). This issue has been patched in version 4.25.2.
References
▼ | URL | Tags |
---|---|---|
https://github.com/strapi/strapi/security/advisories/GHSA-v8wj-f5c7-pvxf | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-52588", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-29T13:44:22.019270Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-29T13:44:40.528Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "strapi", "vendor": "strapi", "versions": [ { "status": "affected", "version": "\u003c 4.25.2" } ] } ], "descriptions": [ { "lang": "en", "value": "Strapi is an open-source content management system. Prior to version 4.25.2, inputting a local domain into the Webhooks URL field leads to the application fetching itself, resulting in a server side request forgery (SSRF). This issue has been patched in version 4.25.2." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-918", "description": "CWE-918: Server-Side Request Forgery (SSRF)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-29T09:02:15.144Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/strapi/strapi/security/advisories/GHSA-v8wj-f5c7-pvxf", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/strapi/strapi/security/advisories/GHSA-v8wj-f5c7-pvxf" } ], "source": { "advisory": "GHSA-v8wj-f5c7-pvxf", "discovery": "UNKNOWN" }, "title": "Strapi allows Server-Side Request Forgery in Webhook function" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-52588", "datePublished": "2025-05-29T09:02:15.144Z", "dateReserved": "2024-11-14T15:05:46.766Z", "dateUpdated": "2025-05-29T13:44:40.528Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-28128 (GCVE-0-2021-28128)
Vulnerability from cvelistv5
Published
2021-05-06 13:49
Modified
2024-08-03 21:33
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
In Strapi through 3.6.0, the admin panel allows the changing of one's own password without entering the current password. An attacker who gains access to a valid session can use this to take over an account by changing the password.
References
▼ | URL | Tags |
---|---|---|
https://github.com/strapi/strapi/releases | x_refsource_MISC | |
https://strapi.io/changelog | x_refsource_MISC | |
https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-008.txt | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T21:33:17.461Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/strapi/strapi/releases" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://strapi.io/changelog" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-008.txt" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In Strapi through 3.6.0, the admin panel allows the changing of one\u0027s own password without entering the current password. An attacker who gains access to a valid session can use this to take over an account by changing the password." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-05-06T13:49:30", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/strapi/strapi/releases" }, { "tags": [ "x_refsource_MISC" ], "url": "https://strapi.io/changelog" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-008.txt" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-28128", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Strapi through 3.6.0, the admin panel allows the changing of one\u0027s own password without entering the current password. An attacker who gains access to a valid session can use this to take over an account by changing the password." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/strapi/strapi/releases", "refsource": "MISC", "url": "https://github.com/strapi/strapi/releases" }, { "name": "https://strapi.io/changelog", "refsource": "MISC", "url": "https://strapi.io/changelog" }, { "name": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-008.txt", "refsource": "MISC", "url": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-008.txt" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-28128", "datePublished": "2021-05-06T13:49:30", "dateReserved": "2021-03-10T00:00:00", "dateUpdated": "2024-08-03T21:33:17.461Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-39345 (GCVE-0-2023-39345)
Vulnerability from cvelistv5
Published
2023-11-06 18:26
Modified
2024-09-04 19:31
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-287 - Improper Authentication
Summary
strapi is an open-source headless CMS. Versions prior to 4.13.1 did not properly restrict write access to fielded marked as private in the user registration endpoint. As such malicious users may be able to errantly modify their user records. This issue has been addressed in version 4.13.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://github.com/strapi/strapi/security/advisories/GHSA-gc7p-j5xm-xxh2 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:02:06.930Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/strapi/strapi/security/advisories/GHSA-gc7p-j5xm-xxh2", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/strapi/strapi/security/advisories/GHSA-gc7p-j5xm-xxh2" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:strapi:strapi:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "strapi", "vendor": "strapi", "versions": [ { "lessThan": "4.13.1", "status": "affected", "version": "4.0.0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-39345", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T19:26:27.084893Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-04T19:31:38.962Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "strapi", "vendor": "strapi", "versions": [ { "status": "affected", "version": "\u003e= 4.0.0, \u003c 4.13.1" } ] } ], "descriptions": [ { "lang": "en", "value": "strapi is an open-source headless CMS. Versions prior to 4.13.1 did not properly restrict write access to fielded marked as private in the user registration endpoint. As such malicious users may be able to errantly modify their user records. This issue has been addressed in version 4.13.1. Users are advised to upgrade. There are no known workarounds for this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 7.6, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-287", "description": "CWE-287: Improper Authentication", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-06T18:26:20.324Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/strapi/strapi/security/advisories/GHSA-gc7p-j5xm-xxh2", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/strapi/strapi/security/advisories/GHSA-gc7p-j5xm-xxh2" } ], "source": { "advisory": "GHSA-gc7p-j5xm-xxh2", "discovery": "UNKNOWN" }, "title": "Unauthorized Access to Private Fields in User Registration API in strapi" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-39345", "datePublished": "2023-11-06T18:26:20.324Z", "dateReserved": "2023-07-28T13:26:46.476Z", "dateUpdated": "2024-09-04T19:31:38.962Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-30618 (GCVE-0-2022-30618)
Vulnerability from cvelistv5
Published
2022-05-19 17:08
Modified
2024-08-03 06:56
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-212 - Improper Removal of Sensitive Information Before Storage or Transfer
Summary
An authenticated user with access to the Strapi admin panel can view private and sensitive data, such as email and password reset tokens, for API users if content types accessible to the authenticated user contain relationships to API users (from:users-permissions). There are many scenarios in which such details from API users can leak in the JSON response within the admin panel, either through a direct or indirect relationship. Access to this information enables a user to compromise these users’ accounts if the password reset API endpoints have been enabled. In a worst-case scenario, a low-privileged user could get access to a high-privileged API account, and could read and modify any data as well as block access to both the admin panel and API by revoking privileges for all other users.
References
▼ | URL | Tags |
---|---|---|
https://www.synopsys.com/blogs/software-security/cyrc-advisory-strapi | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T06:56:13.298Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.synopsys.com/blogs/software-security/cyrc-advisory-strapi" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Strapi", "vendor": "Strapi", "versions": [ { "status": "affected", "version": "\u003c 3.6.10" }, { "status": "affected", "version": "\u003c 4.1.10" } ] } ], "descriptions": [ { "lang": "en", "value": "An authenticated user with access to the Strapi admin panel can view private and sensitive data, such as email and password reset tokens, for API users if content types accessible to the authenticated user contain relationships to API users (from:users-permissions). There are many scenarios in which such details from API users can leak in the JSON response within the admin panel, either through a direct or indirect relationship. Access to this information enables a user to compromise these users\u2019 accounts if the password reset API endpoints have been enabled. In a worst-case scenario, a low-privileged user could get access to a high-privileged API account, and could read and modify any data as well as block access to both the admin panel and API by revoking privileges for all other users." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-212", "description": "CWE-212 Improper Removal of Sensitive Information Before Storage or Transfer", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-19T17:08:47", "orgId": "8cad7728-009c-4a3d-a95e-ca62e6ff8a0b", "shortName": "SNPS" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.synopsys.com/blogs/software-security/cyrc-advisory-strapi" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "disclosure@synopsys.com", "ID": "CVE-2022-30618", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Strapi", "version": { "version_data": [ { "version_value": "\u003c 3.6.10" }, { "version_value": "\u003c 4.1.10" } ] } } ] }, "vendor_name": "Strapi" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An authenticated user with access to the Strapi admin panel can view private and sensitive data, such as email and password reset tokens, for API users if content types accessible to the authenticated user contain relationships to API users (from:users-permissions). There are many scenarios in which such details from API users can leak in the JSON response within the admin panel, either through a direct or indirect relationship. Access to this information enables a user to compromise these users\u2019 accounts if the password reset API endpoints have been enabled. In a worst-case scenario, a low-privileged user could get access to a high-privileged API account, and could read and modify any data as well as block access to both the admin panel and API by revoking privileges for all other users." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-212 Improper Removal of Sensitive Information Before Storage or Transfer" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.synopsys.com/blogs/software-security/cyrc-advisory-strapi", "refsource": "MISC", "url": "https://www.synopsys.com/blogs/software-security/cyrc-advisory-strapi" } ] } } } }, "cveMetadata": { "assignerOrgId": "8cad7728-009c-4a3d-a95e-ca62e6ff8a0b", "assignerShortName": "SNPS", "cveId": "CVE-2022-30618", "datePublished": "2022-05-19T17:08:47", "dateReserved": "2022-05-12T00:00:00", "dateUpdated": "2024-08-03T06:56:13.298Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-27665 (GCVE-0-2020-27665)
Vulnerability from cvelistv5
Published
2020-10-22 18:19
Modified
2024-08-04 16:18
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
In Strapi before 3.2.5, there is no admin::hasPermissions restriction for CTB (aka content-type-builder) routes.
References
▼ | URL | Tags |
---|---|---|
https://github.com/strapi/strapi/releases/tag/v3.2.5 | x_refsource_MISC | |
https://github.com/strapi/strapi/pull/8439 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T16:18:45.659Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/strapi/strapi/releases/tag/v3.2.5" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/strapi/strapi/pull/8439" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In Strapi before 3.2.5, there is no admin::hasPermissions restriction for CTB (aka content-type-builder) routes." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-10-22T18:19:31", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/strapi/strapi/releases/tag/v3.2.5" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/strapi/strapi/pull/8439" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-27665", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Strapi before 3.2.5, there is no admin::hasPermissions restriction for CTB (aka content-type-builder) routes." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/strapi/strapi/releases/tag/v3.2.5", "refsource": "MISC", "url": "https://github.com/strapi/strapi/releases/tag/v3.2.5" }, { "name": "https://github.com/strapi/strapi/pull/8439", "refsource": "MISC", "url": "https://github.com/strapi/strapi/pull/8439" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-27665", "datePublished": "2020-10-22T18:19:31", "dateReserved": "2020-10-22T00:00:00", "dateUpdated": "2024-08-04T16:18:45.659Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-22621 (GCVE-0-2023-22621)
Vulnerability from cvelistv5
Published
2023-04-19 00:00
Modified
2025-02-05 16:47
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Strapi through 4.5.5 allows authenticated Server-Side Template Injection (SSTI) that can be exploited to execute arbitrary code on the server. A remote attacker with access to the Strapi admin panel can inject a crafted payload that executes code on the server into an email template that bypasses the validation checks that should prevent code execution.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:13:49.446Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/strapi/strapi/releases" }, { "tags": [ "x_transferred" ], "url": "https://www.ghostccamm.com/blog/multi_strapi_vulns/" }, { "tags": [ "x_transferred" ], "url": "https://strapi.io/blog/security-disclosure-of-vulnerabilities-cve" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-22621", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-02-05T16:46:02.266609Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-74", "description": "CWE-74 Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-05T16:47:33.902Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Strapi through 4.5.5 allows authenticated Server-Side Template Injection (SSTI) that can be exploited to execute arbitrary code on the server. A remote attacker with access to the Strapi admin panel can inject a crafted payload that executes code on the server into an email template that bypasses the validation checks that should prevent code execution." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-19T00:00:00.000Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://github.com/strapi/strapi/releases" }, { "url": "https://www.ghostccamm.com/blog/multi_strapi_vulns/" }, { "url": "https://strapi.io/blog/security-disclosure-of-vulnerabilities-cve" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2023-22621", "datePublished": "2023-04-19T00:00:00.000Z", "dateReserved": "2023-01-05T00:00:00.000Z", "dateUpdated": "2025-02-05T16:47:33.902Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-32114 (GCVE-0-2022-32114)
Vulnerability from cvelistv5
Published
2022-07-13 00:00
Modified
2025-02-13 16:32
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
An unrestricted file upload vulnerability in the Add New Assets function of Strapi 4.1.12 allows attackers to conduct XSS attacks via a crafted PDF file. NOTE: the project documentation suggests that a user with the Media Library "Create (upload)" permission is supposed to be able to upload PDF files containing JavaScript, and that all files in a public assets folder are accessible to the outside world (unless the filename begins with a dot character). The administrator can choose to allow only image, video, and audio files (i.e., not PDF) if desired.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:32:55.974Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/bypazs/strapi" }, { "tags": [ "x_transferred" ], "url": "https://grimthereaperteam.medium.com/strapi-v4-1-12-unrestricted-file-upload-b993bfd07e4e" }, { "tags": [ "x_transferred" ], "url": "https://docs.strapi.io/dev-docs/configurations/public-assets" }, { "tags": [ "x_transferred" ], "url": "https://docs.strapi.io/user-docs/users-roles-permissions/configuring-administrator-roles" }, { "tags": [ "x_transferred" ], "url": "https://github.com/strapi/strapi/blob/d9277d616b4478a3839e79e47330a4aaf167a2f1/packages/core/upload/admin/src/components/MediaLibraryInput/index.js#L33" }, { "tags": [ "x_transferred" ], "url": "https://github.com/strapi/strapi/blob/d9277d616b4478a3839e79e47330a4aaf167a2f1/packages/core/content-type-builder/admin/src/components/AllowedTypesSelect/index.js#L14" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An unrestricted file upload vulnerability in the Add New Assets function of Strapi 4.1.12 allows attackers to conduct XSS attacks via a crafted PDF file. NOTE: the project documentation suggests that a user with the Media Library \"Create (upload)\" permission is supposed to be able to upload PDF files containing JavaScript, and that all files in a public assets folder are accessible to the outside world (unless the filename begins with a dot character). The administrator can choose to allow only image, video, and audio files (i.e., not PDF) if desired." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-19T17:29:16.918Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://github.com/bypazs/strapi" }, { "url": "https://grimthereaperteam.medium.com/strapi-v4-1-12-unrestricted-file-upload-b993bfd07e4e" }, { "url": "https://docs.strapi.io/dev-docs/configurations/public-assets" }, { "url": "https://docs.strapi.io/user-docs/users-roles-permissions/configuring-administrator-roles" }, { "url": "https://github.com/strapi/strapi/blob/d9277d616b4478a3839e79e47330a4aaf167a2f1/packages/core/upload/admin/src/components/MediaLibraryInput/index.js#L33" }, { "url": "https://github.com/strapi/strapi/blob/d9277d616b4478a3839e79e47330a4aaf167a2f1/packages/core/content-type-builder/admin/src/components/AllowedTypesSelect/index.js#L14" } ], "tags": [ "disputed" ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2022-32114", "datePublished": "2022-07-13T00:00:00.000Z", "dateReserved": "2022-05-31T00:00:00.000Z", "dateUpdated": "2025-02-13T16:32:42.016Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-29894 (GCVE-0-2022-29894)
Vulnerability from cvelistv5
Published
2022-06-13 04:50
Modified
2024-08-03 06:33
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Cross-site scripting
Summary
Strapi v3.x.x versions and earlier contain a stored cross-site scripting vulnerability in file upload function. By exploiting this vulnerability, an arbitrary script may be executed on the web browser of the user who is logging in to the product with the administrative privilege.
References
▼ | URL | Tags |
---|---|---|
https://strapi.io/ | x_refsource_MISC | |
https://github.com/strapi/strapi | x_refsource_MISC | |
https://jvn.jp/en/jp/JVN44550983/index.html | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T06:33:42.954Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://strapi.io/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/strapi/strapi" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jvn.jp/en/jp/JVN44550983/index.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Strapi", "vendor": "Strapi", "versions": [ { "status": "affected", "version": "v3.x.x versions and earlier" } ] } ], "descriptions": [ { "lang": "en", "value": "Strapi v3.x.x versions and earlier contain a stored cross-site scripting vulnerability in file upload function. By exploiting this vulnerability, an arbitrary script may be executed on the web browser of the user who is logging in to the product with the administrative privilege." } ], "problemTypes": [ { "descriptions": [ { "description": "Cross-site scripting", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-13T04:50:34", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://strapi.io/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/strapi/strapi" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jvn.jp/en/jp/JVN44550983/index.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2022-29894", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Strapi", "version": { "version_data": [ { "version_value": "v3.x.x versions and earlier" } ] } } ] }, "vendor_name": "Strapi" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Strapi v3.x.x versions and earlier contain a stored cross-site scripting vulnerability in file upload function. By exploiting this vulnerability, an arbitrary script may be executed on the web browser of the user who is logging in to the product with the administrative privilege." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Cross-site scripting" } ] } ] }, "references": { "reference_data": [ { "name": "https://strapi.io/", "refsource": "MISC", "url": "https://strapi.io/" }, { "name": "https://github.com/strapi/strapi", "refsource": "MISC", "url": "https://github.com/strapi/strapi" }, { "name": "https://jvn.jp/en/jp/JVN44550983/index.html", "refsource": "MISC", "url": "https://jvn.jp/en/jp/JVN44550983/index.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2022-29894", "datePublished": "2022-06-13T04:50:35", "dateReserved": "2022-05-06T00:00:00", "dateUpdated": "2024-08-03T06:33:42.954Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-46440 (GCVE-0-2021-46440)
Vulnerability from cvelistv5
Published
2022-05-03 17:03
Modified
2024-08-04 05:02
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Storing passwords in a recoverable format in the DOCUMENTATION plugin component of Strapi before 3.6.9 and 4.x before 4.1.5 allows an attacker to access a victim's HTTP request, get the victim's cookie, perform a base64 decode on the victim's cookie, and obtain a cleartext password, leading to getting API documentation for further API attacks.
References
▼ | URL | Tags |
---|---|---|
https://strapi.io/ | x_refsource_MISC | |
https://hub.docker.com/r/strapi/strapi | x_refsource_MISC | |
http://packetstormsecurity.com/files/166915/Strapi-3.6.8-Password-Disclosure-Insecure-Handling.html | x_refsource_MISC | |
https://github.com/strapi/strapi/pull/12246 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:02:11.785Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://strapi.io/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hub.docker.com/r/strapi/strapi" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/166915/Strapi-3.6.8-Password-Disclosure-Insecure-Handling.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/strapi/strapi/pull/12246" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Storing passwords in a recoverable format in the DOCUMENTATION plugin component of Strapi before 3.6.9 and 4.x before 4.1.5 allows an attacker to access a victim\u0027s HTTP request, get the victim\u0027s cookie, perform a base64 decode on the victim\u0027s cookie, and obtain a cleartext password, leading to getting API documentation for further API attacks." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-03T17:03:51", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://strapi.io/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://hub.docker.com/r/strapi/strapi" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/166915/Strapi-3.6.8-Password-Disclosure-Insecure-Handling.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/strapi/strapi/pull/12246" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-46440", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Storing passwords in a recoverable format in the DOCUMENTATION plugin component of Strapi before 3.6.9 and 4.x before 4.1.5 allows an attacker to access a victim\u0027s HTTP request, get the victim\u0027s cookie, perform a base64 decode on the victim\u0027s cookie, and obtain a cleartext password, leading to getting API documentation for further API attacks." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://strapi.io/", "refsource": "MISC", "url": "https://strapi.io/" }, { "name": "https://hub.docker.com/r/strapi/strapi", "refsource": "MISC", "url": "https://hub.docker.com/r/strapi/strapi" }, { "name": "http://packetstormsecurity.com/files/166915/Strapi-3.6.8-Password-Disclosure-Insecure-Handling.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/166915/Strapi-3.6.8-Password-Disclosure-Insecure-Handling.html" }, { "name": "https://github.com/strapi/strapi/pull/12246", "refsource": "MISC", "url": "https://github.com/strapi/strapi/pull/12246" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-46440", "datePublished": "2022-05-03T17:03:51", "dateReserved": "2022-01-24T00:00:00", "dateUpdated": "2024-08-04T05:02:11.785Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-34235 (GCVE-0-2023-34235)
Vulnerability from cvelistv5
Published
2023-07-25 17:24
Modified
2024-10-03 20:02
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-200 - Exposure of Sensitive Information to an Unauthorized Actor
Summary
Strapi is an open-source headless content management system. Prior to version 4.10.8, it is possible to leak private fields if one is using the `t(number)` prefix. Knex query allows users to change the default prefix. For example, if someone changes the prefix to be the same as it was before or to another table they want to query, the query changes from `password` to `t1.password`. `password` is protected by filtering protections but `t1.password` is not protected. This can lead to filtering attacks on everything related to the object again, including admin passwords and reset-tokens. Version 4.10.8 fixes this issue.
References
▼ | URL | Tags |
---|---|---|
https://github.com/strapi/strapi/security/advisories/GHSA-9xg4-3qfm-9w8f | x_refsource_CONFIRM | |
https://github.com/strapi/strapi/releases/tag/v4.10.8 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T16:01:54.326Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/strapi/strapi/security/advisories/GHSA-9xg4-3qfm-9w8f", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/strapi/strapi/security/advisories/GHSA-9xg4-3qfm-9w8f" }, { "name": "https://github.com/strapi/strapi/releases/tag/v4.10.8", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/strapi/strapi/releases/tag/v4.10.8" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:strapi:strapi:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "strapi", "vendor": "strapi", "versions": [ { "lessThan": "4.10.8", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-34235", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-03T20:02:03.633467Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-03T20:02:58.764Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "strapi", "vendor": "strapi", "versions": [ { "status": "affected", "version": "\u003c 4.10.8" } ] } ], "descriptions": [ { "lang": "en", "value": "Strapi is an open-source headless content management system. Prior to version 4.10.8, it is possible to leak private fields if one is using the `t(number)` prefix. Knex query allows users to change the default prefix. For example, if someone changes the prefix to be the same as it was before or to another table they want to query, the query changes from `password` to `t1.password`. `password` is protected by filtering protections but `t1.password` is not protected. This can lead to filtering attacks on everything related to the object again, including admin passwords and reset-tokens. Version 4.10.8 fixes this issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-25T17:24:19.864Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/strapi/strapi/security/advisories/GHSA-9xg4-3qfm-9w8f", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/strapi/strapi/security/advisories/GHSA-9xg4-3qfm-9w8f" }, { "name": "https://github.com/strapi/strapi/releases/tag/v4.10.8", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/strapi/strapi/releases/tag/v4.10.8" } ], "source": { "advisory": "GHSA-9xg4-3qfm-9w8f", "discovery": "UNKNOWN" }, "title": "Leaking sensitive user information still possible by filtering on private with prefix fields" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-34235", "datePublished": "2023-07-25T17:24:19.864Z", "dateReserved": "2023-05-31T13:51:51.169Z", "dateUpdated": "2024-10-03T20:02:58.764Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-8123 (GCVE-0-2020-8123)
Vulnerability from cvelistv5
Published
2020-02-04 19:08
Modified
2024-08-04 09:48
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-400 - Denial of Service ()
Summary
A denial of service exists in strapi v3.0.0-beta.18.3 and earlier that can be abused in the admin console using admin rights can lead to arbitrary restart of the application.
References
▼ | URL | Tags |
---|---|---|
https://hackerone.com/reports/768574 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T09:48:25.652Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/768574" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Strapi", "vendor": "n/a", "versions": [ { "status": "affected", "version": "v3.0.0-beta.18.4" } ] } ], "descriptions": [ { "lang": "en", "value": "A denial of service exists in strapi v3.0.0-beta.18.3 and earlier that can be abused in the admin console using admin rights can lead to arbitrary restart of the application." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "Denial of Service (CWE-400)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-02-04T19:08:57", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/768574" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "support@hackerone.com", "ID": "CVE-2020-8123", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Strapi", "version": { "version_data": [ { "version_value": "v3.0.0-beta.18.4" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A denial of service exists in strapi v3.0.0-beta.18.3 and earlier that can be abused in the admin console using admin rights can lead to arbitrary restart of the application." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service (CWE-400)" } ] } ] }, "references": { "reference_data": [ { "name": "https://hackerone.com/reports/768574", "refsource": "MISC", "url": "https://hackerone.com/reports/768574" } ] } } } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2020-8123", "datePublished": "2020-02-04T19:08:57", "dateReserved": "2020-01-28T00:00:00", "dateUpdated": "2024-08-04T09:48:25.652Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-38507 (GCVE-0-2023-38507)
Vulnerability from cvelistv5
Published
2023-09-15 19:15
Modified
2024-09-25 18:05
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-770 - Allocation of Resources Without Limits or Throttling
Summary
Strapi is the an open-source headless content management system. Prior to version 4.12.1, there is a rate limit on the login function of Strapi's admin screen, but it is possible to circumvent it. Therefore, the possibility of unauthorized login by login brute force attack increases. Version 4.12.1 has a fix for this issue.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T17:46:55.754Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/strapi/strapi/security/advisories/GHSA-24q2-59hm-rh9r", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/strapi/strapi/security/advisories/GHSA-24q2-59hm-rh9r" }, { "name": "https://github.com/strapi/strapi/blob/32d68f1f5677ed9a9a505b718c182c0a3f885426/packages/core/admin/server/middlewares/rateLimit.js#L31", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/strapi/strapi/blob/32d68f1f5677ed9a9a505b718c182c0a3f885426/packages/core/admin/server/middlewares/rateLimit.js#L31" }, { "name": "https://github.com/strapi/strapi/releases/tag/v4.12.1", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/strapi/strapi/releases/tag/v4.12.1" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-38507", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-25T18:05:45.725783Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-25T18:05:58.465Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "strapi", "vendor": "strapi", "versions": [ { "status": "affected", "version": "\u003c 4.12.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Strapi is the an open-source headless content management system. Prior to version 4.12.1, there is a rate limit on the login function of Strapi\u0027s admin screen, but it is possible to circumvent it. Therefore, the possibility of unauthorized login by login brute force attack increases. Version 4.12.1 has a fix for this issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-770", "description": "CWE-770: Allocation of Resources Without Limits or Throttling", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-15T19:15:06.391Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/strapi/strapi/security/advisories/GHSA-24q2-59hm-rh9r", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/strapi/strapi/security/advisories/GHSA-24q2-59hm-rh9r" }, { "name": "https://github.com/strapi/strapi/blob/32d68f1f5677ed9a9a505b718c182c0a3f885426/packages/core/admin/server/middlewares/rateLimit.js#L31", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/strapi/strapi/blob/32d68f1f5677ed9a9a505b718c182c0a3f885426/packages/core/admin/server/middlewares/rateLimit.js#L31" }, { "name": "https://github.com/strapi/strapi/releases/tag/v4.12.1", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/strapi/strapi/releases/tag/v4.12.1" } ], "source": { "advisory": "GHSA-24q2-59hm-rh9r", "discovery": "UNKNOWN" }, "title": "Strapi Improper Rate Limiting vulnerability" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-38507", "datePublished": "2023-09-15T19:15:06.391Z", "dateReserved": "2023-07-18T16:28:12.078Z", "dateUpdated": "2024-09-25T18:05:58.465Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-18818 (GCVE-0-2019-18818)
Vulnerability from cvelistv5
Published
2019-11-07 21:02
Modified
2024-08-05 02:02
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
strapi before 3.0.0-beta.17.5 mishandles password resets within packages/strapi-admin/controllers/Auth.js and packages/strapi-plugin-users-permissions/controllers/Auth.js.
References
▼ | URL | Tags |
---|---|---|
https://github.com/strapi/strapi/pull/4443 | x_refsource_MISC | |
https://github.com/strapi/strapi/releases/tag/v3.0.0-beta.17.5 | x_refsource_MISC | |
https://www.npmjs.com/advisories/1311 | x_refsource_MISC | |
http://packetstormsecurity.com/files/163950/Strapi-CMS-3.0.0-beta.17.4-Remote-Code-Execution.html | x_refsource_MISC | |
http://packetstormsecurity.com/files/163939/Strapi-3.0.0-beta-Authentication-Bypass.html | x_refsource_MISC | |
http://packetstormsecurity.com/files/165896/Strapi-CMS-3.0.0-beta.17.4-Privilege-Escalation.html | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T02:02:39.859Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/strapi/strapi/pull/4443" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/strapi/strapi/releases/tag/v3.0.0-beta.17.5" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.npmjs.com/advisories/1311" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/163950/Strapi-CMS-3.0.0-beta.17.4-Remote-Code-Execution.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/163939/Strapi-3.0.0-beta-Authentication-Bypass.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/165896/Strapi-CMS-3.0.0-beta.17.4-Privilege-Escalation.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "strapi before 3.0.0-beta.17.5 mishandles password resets within packages/strapi-admin/controllers/Auth.js and packages/strapi-plugin-users-permissions/controllers/Auth.js." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-08T18:06:16", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/strapi/strapi/pull/4443" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/strapi/strapi/releases/tag/v3.0.0-beta.17.5" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.npmjs.com/advisories/1311" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/163950/Strapi-CMS-3.0.0-beta.17.4-Remote-Code-Execution.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/163939/Strapi-3.0.0-beta-Authentication-Bypass.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/165896/Strapi-CMS-3.0.0-beta.17.4-Privilege-Escalation.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-18818", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "strapi before 3.0.0-beta.17.5 mishandles password resets within packages/strapi-admin/controllers/Auth.js and packages/strapi-plugin-users-permissions/controllers/Auth.js." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/strapi/strapi/pull/4443", "refsource": "MISC", "url": "https://github.com/strapi/strapi/pull/4443" }, { "name": "https://github.com/strapi/strapi/releases/tag/v3.0.0-beta.17.5", "refsource": "MISC", "url": "https://github.com/strapi/strapi/releases/tag/v3.0.0-beta.17.5" }, { "name": "https://www.npmjs.com/advisories/1311", "refsource": "MISC", "url": "https://www.npmjs.com/advisories/1311" }, { "name": "http://packetstormsecurity.com/files/163950/Strapi-CMS-3.0.0-beta.17.4-Remote-Code-Execution.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/163950/Strapi-CMS-3.0.0-beta.17.4-Remote-Code-Execution.html" }, { "name": "http://packetstormsecurity.com/files/163939/Strapi-3.0.0-beta-Authentication-Bypass.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/163939/Strapi-3.0.0-beta-Authentication-Bypass.html" }, { "name": "http://packetstormsecurity.com/files/165896/Strapi-CMS-3.0.0-beta.17.4-Privilege-Escalation.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/165896/Strapi-CMS-3.0.0-beta.17.4-Privilege-Escalation.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-18818", "datePublished": "2019-11-07T21:02:58", "dateReserved": "2019-11-07T00:00:00", "dateUpdated": "2024-08-05T02:02:39.859Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-34065 (GCVE-0-2024-34065)
Vulnerability from cvelistv5
Published
2024-06-12 14:54
Modified
2024-08-02 02:42
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
Strapi is an open-source content management system. By combining two vulnerabilities (an `Open Redirect` and `session token sent as URL query parameter`) in @strapi/plugin-users-permissions before version 4.24.2, is its possible of an unauthenticated attacker to bypass authentication mechanisms and retrieve the 3rd party tokens. The attack requires user interaction (one click). Unauthenticated attackers can leverage two vulnerabilities to obtain an 3rd party token and the bypass authentication of Strapi apps. Users should upgrade @strapi/plugin-users-permissions to version 4.24.2 to receive a patch.
References
▼ | URL | Tags |
---|---|---|
https://github.com/strapi/strapi/security/advisories/GHSA-wrvh-rcmr-9qfc | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:strapi:strapi:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "strapi", "vendor": "strapi", "versions": [ { "lessThanOrEqual": "4.24.1", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-34065", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-06-12T16:08:21.487136Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-12T16:10:44.870Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T02:42:59.898Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/strapi/strapi/security/advisories/GHSA-wrvh-rcmr-9qfc", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/strapi/strapi/security/advisories/GHSA-wrvh-rcmr-9qfc" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "strapi", "vendor": "strapi", "versions": [ { "status": "affected", "version": "\u003c 4.24.2" } ] } ], "descriptions": [ { "lang": "en", "value": "Strapi is an open-source content management system. By combining two vulnerabilities (an `Open Redirect` and `session token sent as URL query parameter`) in @strapi/plugin-users-permissions before version 4.24.2, is its possible of an unauthenticated attacker to bypass authentication mechanisms and retrieve the 3rd party tokens. The attack requires user interaction (one click). Unauthenticated attackers can leverage two vulnerabilities to obtain an 3rd party token and the bypass authentication of Strapi apps. Users should upgrade @strapi/plugin-users-permissions to version 4.24.2 to receive a patch." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-294", "description": "CWE-294: Authentication Bypass by Capture-replay", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-601", "description": "CWE-601: URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-12T14:54:46.045Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/strapi/strapi/security/advisories/GHSA-wrvh-rcmr-9qfc", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/strapi/strapi/security/advisories/GHSA-wrvh-rcmr-9qfc" } ], "source": { "advisory": "GHSA-wrvh-rcmr-9qfc", "discovery": "UNKNOWN" }, "title": "@strapi/plugin-users-permissions leaks 3rd party authentication tokens and authentication bypass" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-34065", "datePublished": "2024-06-12T14:54:46.045Z", "dateReserved": "2024-04-30T06:56:33.381Z", "dateUpdated": "2024-08-02T02:42:59.898Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2020-10-22 19:15
Modified
2024-11-21 05:21
Severity ?
Summary
admin/src/containers/InputModalStepperProvider/index.js in Strapi before 3.2.5 has unwanted /proxy?url= functionality.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://github.com/strapi/strapi/pull/8442 | Patch, Third Party Advisory | |
cve@mitre.org | https://github.com/strapi/strapi/releases/tag/v3.2.5 | Release Notes, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/strapi/strapi/pull/8442 | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/strapi/strapi/releases/tag/v3.2.5 | Release Notes, Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:strapi:strapi:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4C05BD6-1646-4105-B1B2-F8D781D796FA", "versionEndExcluding": "3.2.5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "admin/src/containers/InputModalStepperProvider/index.js in Strapi before 3.2.5 has unwanted /proxy?url= functionality." }, { "lang": "es", "value": "El archivo admin/src/containers/InputModalStepperProvider/index.js en Strapi versiones anteriores a 3.2.5, presenta una funcionalidad /proxy?url= no deseada" } ], "id": "CVE-2020-27664", "lastModified": "2024-11-21T05:21:37.450", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-10-22T19:15:13.777", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/strapi/strapi/pull/8442" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/strapi/strapi/releases/tag/v3.2.5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/strapi/strapi/pull/8442" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/strapi/strapi/releases/tag/v3.2.5" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-05-19 18:15
Modified
2024-11-21 07:03
Severity ?
Summary
An authenticated user with access to the Strapi admin panel can view private and sensitive data, such as email and password reset tokens, for other admin panel users that have a relationship (e.g., created by, updated by) with content accessible to the authenticated user. For example, a low-privileged “author” role account can view these details in the JSON response for an “editor” or “super admin” that has updated one of the author’s blog posts. There are also many other scenarios where such details from other users can leak in the JSON response, either through a direct or indirect relationship. Access to this information enables a user to compromise other users’ accounts by successfully invoking the password reset workflow. In a worst-case scenario, a low-privileged user could get access to a “super admin” account with full control over the Strapi instance, and could read and modify any data as well as block access to both the admin panel and API by revoking privileges for all other users.
References
▼ | URL | Tags | |
---|---|---|---|
disclosure@synopsys.com | https://www.synopsys.com/blogs/software-security/cyrc-advisory-strapi | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.synopsys.com/blogs/software-security/cyrc-advisory-strapi | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
strapi | strapi | * | |
strapi | strapi | 4.0.0 | |
strapi | strapi | 4.0.0 | |
strapi | strapi | 4.0.0 | |
strapi | strapi | 4.0.0 | |
strapi | strapi | 4.0.0 | |
strapi | strapi | 4.0.0 | |
strapi | strapi | 4.0.0 | |
strapi | strapi | 4.0.0 | |
strapi | strapi | 4.0.0 | |
strapi | strapi | 4.0.0 | |
strapi | strapi | 4.0.0 | |
strapi | strapi | 4.0.0 | |
strapi | strapi | 4.0.0 | |
strapi | strapi | 4.0.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:strapi:strapi:*:*:*:*:*:*:*:*", "matchCriteriaId": "02E592C9-FFDC-4DB5-BF02-205DB10A18A9", "versionEndExcluding": "3.6.10", "versionStartIncluding": "3.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:4.0.0:beta10:*:*:*:*:*:*", "matchCriteriaId": "F07DC62A-C081-4756-9A1E-75F15337AA84", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:4.0.0:beta11:*:*:*:*:*:*", "matchCriteriaId": "6D660640-90B4-4886-8FB6-02DACBA84F28", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:4.0.0:beta12:*:*:*:*:*:*", "matchCriteriaId": "4ED75EB0-04B7-45AE-AF84-481952E39FEE", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:4.0.0:beta13:*:*:*:*:*:*", "matchCriteriaId": "52107FB6-C01A-4520-9866-6096AB3416D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:4.0.0:beta14:*:*:*:*:*:*", "matchCriteriaId": "0DA682BE-2EF2-4955-862C-B96ABC744068", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:4.0.0:beta15:*:*:*:*:*:*", "matchCriteriaId": "5D099441-B442-41C8-A0BC-B86B34905F3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:4.0.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "223136B2-C973-4BD5-A45E-4355C48556A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:4.0.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "F8959628-F59A-4996-AE23-4F39A2EA42A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:4.0.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "5CFBF81E-1CA3-4501-AE23-A048FE18931C", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:4.0.0:beta5:*:*:*:*:*:*", "matchCriteriaId": "544C7DA4-0D25-49A7-AD63-38AF11EDF755", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:4.0.0:beta6:*:*:*:*:*:*", "matchCriteriaId": "2A1F7462-6676-46A7-8B46-1A67337AF713", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:4.0.0:beta7:*:*:*:*:*:*", "matchCriteriaId": "CF8DCA9B-47BA-4975-B4D2-C22C8BDCC8B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:4.0.0:beta8:*:*:*:*:*:*", "matchCriteriaId": "E92B7FFE-41DF-4EF5-8484-4E7B4BD1DFA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:4.0.0:beta9:*:*:*:*:*:*", "matchCriteriaId": "AB237119-741F-4000-8A9A-C12FB4FDA1AD", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An authenticated user with access to the Strapi admin panel can view private and sensitive data, such as email and password reset tokens, for other admin panel users that have a relationship (e.g., created by, updated by) with content accessible to the authenticated user. For example, a low-privileged \u201cauthor\u201d role account can view these details in the JSON response for an \u201ceditor\u201d or \u201csuper admin\u201d that has updated one of the author\u2019s blog posts. There are also many other scenarios where such details from other users can leak in the JSON response, either through a direct or indirect relationship. Access to this information enables a user to compromise other users\u2019 accounts by successfully invoking the password reset workflow. In a worst-case scenario, a low-privileged user could get access to a \u201csuper admin\u201d account with full control over the Strapi instance, and could read and modify any data as well as block access to both the admin panel and API by revoking privileges for all other users." }, { "lang": "es", "value": "Un usuario autenticado con acceso al panel de administraci\u00f3n de Strapi puede visualizar datos privados y confidenciales, como el correo electr\u00f3nico y los tokens de restablecimiento de contrase\u00f1a, para otros usuarios del panel de administraci\u00f3n que tengan una relaci\u00f3n (por ejemplo, creado por, actualizado por) con el contenido accesible para el usuario autenticado. Por ejemplo, una cuenta de rol \"author\" con pocos privilegios puede visualizar estos detalles en la respuesta JSON para un \"editor\" o \"super admin\" que haya actualizado una de las entradas del blog del autor. Tambi\u00e9n se presentan muchos otros escenarios donde estos detalles de otros usuarios pueden filtrarse en la respuesta JSON, ya sea mediante una relaci\u00f3n directa o indirecta. El acceso a esta informaci\u00f3n permite a un usuario comprometer las cuentas de otros usuarios al invocar con \u00e9xito el flujo de trabajo de restablecimiento de contrase\u00f1a. En el peor de los casos, un usuario con pocos privilegios podr\u00eda acceder a una cuenta \"super admin\" con control total sobre la instancia de Strapi, y podr\u00eda leer y modificar cualquier dato, as\u00ed como bloquear el acceso tanto al panel de administraci\u00f3n como a la API al revocar los privilegios de todos los dem\u00e1s usuarios" } ], "id": "CVE-2022-30617", "lastModified": "2024-11-21T07:03:02.130", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-05-19T18:15:09.587", "references": [ { "source": "disclosure@synopsys.com", "tags": [ "Third Party Advisory" ], "url": "https://www.synopsys.com/blogs/software-security/cyrc-advisory-strapi" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.synopsys.com/blogs/software-security/cyrc-advisory-strapi" } ], "sourceIdentifier": "disclosure@synopsys.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-212" } ], "source": "disclosure@synopsys.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-212" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-11-06 19:15
Modified
2024-11-21 08:15
Severity ?
7.6 (High) - CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Summary
strapi is an open-source headless CMS. Versions prior to 4.13.1 did not properly restrict write access to fielded marked as private in the user registration endpoint. As such malicious users may be able to errantly modify their user records. This issue has been addressed in version 4.13.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.
References
▼ | URL | Tags | |
---|---|---|---|
security-advisories@github.com | https://github.com/strapi/strapi/security/advisories/GHSA-gc7p-j5xm-xxh2 | Exploit, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/strapi/strapi/security/advisories/GHSA-gc7p-j5xm-xxh2 | Exploit, Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:strapi:strapi:*:*:*:*:*:*:*:*", "matchCriteriaId": "E087BBD7-82BC-4692-92DE-1476210EF50C", "versionEndExcluding": "4.13.1", "versionStartIncluding": "4.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "strapi is an open-source headless CMS. Versions prior to 4.13.1 did not properly restrict write access to fielded marked as private in the user registration endpoint. As such malicious users may be able to errantly modify their user records. This issue has been addressed in version 4.13.1. Users are advised to upgrade. There are no known workarounds for this vulnerability." }, { "lang": "es", "value": "Strapi es un CMS sin cabeza de c\u00f3digo abierto. Las versiones anteriores a la 4.13.1 no restring\u00edan adecuadamente el acceso de escritura a los campos marcados como privados en el endpoint de registro de usuario. Como tal, los usuarios malintencionados pueden modificar err\u00f3neamente sus registros de usuario. Este problema se solucion\u00f3 en la versi\u00f3n 4.13.1. Se recomienda a los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad." } ], "id": "CVE-2023-39345", "lastModified": "2024-11-21T08:15:12.060", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 7.6, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 4.7, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-11-06T19:15:09.027", "references": [ { "source": "security-advisories@github.com", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://github.com/strapi/strapi/security/advisories/GHSA-gc7p-j5xm-xxh2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://github.com/strapi/strapi/security/advisories/GHSA-gc7p-j5xm-xxh2" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "security-advisories@github.com", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-05-03 18:15
Modified
2024-11-21 06:34
Severity ?
Summary
Storing passwords in a recoverable format in the DOCUMENTATION plugin component of Strapi before 3.6.9 and 4.x before 4.1.5 allows an attacker to access a victim's HTTP request, get the victim's cookie, perform a base64 decode on the victim's cookie, and obtain a cleartext password, leading to getting API documentation for further API attacks.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://packetstormsecurity.com/files/166915/Strapi-3.6.8-Password-Disclosure-Insecure-Handling.html | Exploit, Third Party Advisory, VDB Entry | |
cve@mitre.org | https://github.com/strapi/strapi/pull/12246 | Issue Tracking, Patch, Third Party Advisory | |
cve@mitre.org | https://hub.docker.com/r/strapi/strapi | Product, Third Party Advisory | |
cve@mitre.org | https://strapi.io/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/166915/Strapi-3.6.8-Password-Disclosure-Insecure-Handling.html | Exploit, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/strapi/strapi/pull/12246 | Issue Tracking, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://hub.docker.com/r/strapi/strapi | Product, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://strapi.io/ | Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:strapi:strapi:*:*:*:*:*:*:*:*", "matchCriteriaId": "6A368B25-5C0F-4885-A0FA-156C7881B30B", "versionEndExcluding": "3.6.9", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:*:*:*:*:*:*:*:*", "matchCriteriaId": "29511A09-FD40-43FB-AF68-44515729C2ED", "versionEndExcluding": "4.1.5", "versionStartIncluding": "4.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Storing passwords in a recoverable format in the DOCUMENTATION plugin component of Strapi before 3.6.9 and 4.x before 4.1.5 allows an attacker to access a victim\u0027s HTTP request, get the victim\u0027s cookie, perform a base64 decode on the victim\u0027s cookie, and obtain a cleartext password, leading to getting API documentation for further API attacks." }, { "lang": "es", "value": "El almacenamiento de contrase\u00f1as en un formato recuperable en el componente del plugin DOCUMENTATION de Strapi versiones anteriores a 3.6.9 y versiones 4.x anteriores a 4.1.5 permite a un atacante acceder a la petici\u00f3n HTTP de una v\u00edctima, obtener la cookie de la v\u00edctima, llevar a cabo una decodificaci\u00f3n base64 en la cookie de la v\u00edctima y obtener una contrase\u00f1a en texto sin cifrar, conllevando a una obtenci\u00f3n de la documentaci\u00f3n de la API para posteriores ataques a la misma" } ], "id": "CVE-2021-46440", "lastModified": "2024-11-21T06:34:04.980", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-05-03T18:15:08.763", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/166915/Strapi-3.6.8-Password-Disclosure-Insecure-Handling.html" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/strapi/strapi/pull/12246" }, { "source": "cve@mitre.org", "tags": [ "Product", "Third Party Advisory" ], "url": "https://hub.docker.com/r/strapi/strapi" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://strapi.io/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/166915/Strapi-3.6.8-Password-Disclosure-Insecure-Handling.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/strapi/strapi/pull/12246" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product", "Third Party Advisory" ], "url": "https://hub.docker.com/r/strapi/strapi" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://strapi.io/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-522" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-12-05 20:15
Modified
2024-11-21 04:35
Severity ?
Summary
The Strapi framework before 3.0.0-beta.17.8 is vulnerable to Remote Code Execution in the Install and Uninstall Plugin components of the Admin panel, because it does not sanitize the plugin name, and attackers can inject arbitrary shell commands to be executed by the execa function.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:strapi:strapi:*:*:*:*:*:*:*:*", "matchCriteriaId": "A97983D3-FFBA-485E-8496-6489A9074853", "versionEndIncluding": "1.6.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha10.1:*:*:*:*:*:*", "matchCriteriaId": "3E72C7A0-197D-4324-BBB4-663223C52C7C", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha10.2:*:*:*:*:*:*", "matchCriteriaId": "954FDA03-9914-42DC-9AF0-81CB69BD0442", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha10.3:*:*:*:*:*:*", "matchCriteriaId": "7B4D7C63-F071-4572-BD81-65ABCA693A8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha11:*:*:*:*:*:*", "matchCriteriaId": "003189F7-77BD-416F-A253-C808E7E38A11", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha11.1:*:*:*:*:*:*", "matchCriteriaId": "A1DDFD47-7C0A-447F-9A34-F7690B28A4B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha11.2:*:*:*:*:*:*", "matchCriteriaId": "F3EA2B22-E04D-48FB-8BD9-9CD66598346A", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha11.3:*:*:*:*:*:*", "matchCriteriaId": "6F39E9F5-8AEE-4E26-A084-1BF813A65FFD", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha12:*:*:*:*:*:*", "matchCriteriaId": "31EC2516-DA0E-4710-AB98-11E1081764DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha12.1:*:*:*:*:*:*", "matchCriteriaId": "62C28A62-C16D-47D6-9D56-2B236287CBF6", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha12.1.3:*:*:*:*:*:*", "matchCriteriaId": "D000CAF1-B033-4CF6-B6B4-1A9C10239886", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha12.2:*:*:*:*:*:*", "matchCriteriaId": "C424AFC4-3DBA-4F69-A030-6B143ADEAE13", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha12.3:*:*:*:*:*:*", "matchCriteriaId": "1B8C9E2B-58B7-4938-BF34-BB2E4322F53F", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha12.4:*:*:*:*:*:*", "matchCriteriaId": "CE6F7CA0-11AE-45F0-B1AA-034A32CC0C5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha12.5:*:*:*:*:*:*", "matchCriteriaId": "F3747021-429C-4D16-A740-A9C69FA06561", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha12.6:*:*:*:*:*:*", "matchCriteriaId": "2E76C452-5545-4495-A671-4207A3DFE710", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha12.7:*:*:*:*:*:*", "matchCriteriaId": "6D493E54-F8BE-470D-B78C-EF2E48645BEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha12.7.1:*:*:*:*:*:*", "matchCriteriaId": "11C6D99B-67E0-4828-A812-EA987D585C75", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha13:*:*:*:*:*:*", "matchCriteriaId": "D6D0EA14-3E88-491D-9522-5F9F2F968329", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha13.0.1:*:*:*:*:*:*", "matchCriteriaId": "38DF3333-7B40-41A1-8C1A-EE644867193C", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha13.1:*:*:*:*:*:*", "matchCriteriaId": "ECC59C0A-60C1-4DC7-B127-D512271DA491", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha14:*:*:*:*:*:*", "matchCriteriaId": "17CA9542-43DC-4D7D-A159-D7D56639EE46", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha14.1:*:*:*:*:*:*", "matchCriteriaId": "1826129C-FF15-4422-97CA-F383E6F86B36", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha14.1.1:*:*:*:*:*:*", "matchCriteriaId": "95509917-C33A-43C1-9043-D9618884FDF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha14.2:*:*:*:*:*:*", "matchCriteriaId": "2CF2A7C5-F97C-447B-977D-243321CD807D", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha14.3:*:*:*:*:*:*", "matchCriteriaId": "0A4DF814-73F9-4D04-87BD-03839E7E5BD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha14.4.0:*:*:*:*:*:*", "matchCriteriaId": "4198B34C-CFE0-46AD-A2D6-926F5A037759", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha14.5:*:*:*:*:*:*", "matchCriteriaId": "76B25EF2-EFB6-4626-AC51-209523A1342E", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha15:*:*:*:*:*:*", "matchCriteriaId": "D15150B6-8B20-496A-BD97-F598E2C243AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha16:*:*:*:*:*:*", "matchCriteriaId": "39C8378E-BBFC-48D0-B69B-ED034BAA100C", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha17:*:*:*:*:*:*", "matchCriteriaId": "006A3591-8908-4B9A-A3BA-C2136FC6B009", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha18:*:*:*:*:*:*", "matchCriteriaId": "1E85C03D-DA48-4F2D-A995-0FC82B61327D", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha19:*:*:*:*:*:*", "matchCriteriaId": "1F314776-5157-488E-B7A8-B074BC31CC63", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha20:*:*:*:*:*:*", "matchCriteriaId": "80EF6FFD-318D-42C7-A5E0-FD2B9E561F68", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha21:*:*:*:*:*:*", "matchCriteriaId": "B46002D9-0AD1-48F2-9CE0-6ECD2AE166DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha22:*:*:*:*:*:*", "matchCriteriaId": "5184E9EB-396B-412D-88F5-A852F8D74289", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha23:*:*:*:*:*:*", "matchCriteriaId": "149771DC-DE72-43DB-9B5C-3717B7078FB6", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha23.1:*:*:*:*:*:*", "matchCriteriaId": "2A67962C-D35B-408A-BD74-0B4647B81A23", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha24:*:*:*:*:*:*", "matchCriteriaId": "31083AE3-3D91-4F23-AE4C-2EB08FF4BAF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha24.1:*:*:*:*:*:*", "matchCriteriaId": "651B10C1-918E-4F6C-970B-45FA9DDE83E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha25:*:*:*:*:*:*", "matchCriteriaId": "20A37EAD-A610-450B-8DC2-A8208200E641", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha25.1:*:*:*:*:*:*", "matchCriteriaId": "836A2C35-38D8-4ED6-B87D-2003C2F3A445", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha25.2:*:*:*:*:*:*", "matchCriteriaId": "4153D69D-D158-4AFF-9936-A944B0F7F8E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha26:*:*:*:*:*:*", "matchCriteriaId": "09EA2597-2BA4-4747-9B52-E4E713594A00", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha26.1:*:*:*:*:*:*", "matchCriteriaId": "19C9D4D8-978A-431C-B39C-80AB7B22D7D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha26.2:*:*:*:*:*:*", "matchCriteriaId": "9423DAF3-6295-4B9D-9B99-CAA9EE698548", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha4:*:*:*:*:*:*", "matchCriteriaId": "021CE25F-44BD-403C-89EB-91127319B7B8", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha4.8:*:*:*:*:*:*", "matchCriteriaId": "54039D06-9AE2-4B83-A7D4-80177A3A5F56", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha5.3:*:*:*:*:*:*", "matchCriteriaId": "98503595-C247-499B-8654-424004FAA263", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha5.5:*:*:*:*:*:*", "matchCriteriaId": "6EE84452-19EC-41BE-9075-D48FA4BFD230", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha6.3:*:*:*:*:*:*", "matchCriteriaId": "01E106C1-EF1B-4768-AB51-19FEA9597558", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha6.4:*:*:*:*:*:*", "matchCriteriaId": "61CE8F6A-7D01-45EE-8EB9-39AE0D2BDB09", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha6.7:*:*:*:*:*:*", "matchCriteriaId": "73C9DB4F-266C-4180-A1C1-8DA14854B52C", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha7.2:*:*:*:*:*:*", "matchCriteriaId": "07D25069-D60A-4E25-9817-575F555AE176", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha7.3:*:*:*:*:*:*", "matchCriteriaId": "1377CFAD-6C86-4A7B-AEDC-26ACBE6C4AC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha8:*:*:*:*:*:*", "matchCriteriaId": "7066F2B2-B0B1-4922-972A-F0B8963FC594", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha8.3:*:*:*:*:*:*", "matchCriteriaId": "AD5E0CEF-E30E-4828-891B-056A7FC29951", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha9:*:*:*:*:*:*", "matchCriteriaId": "FA634AA2-114D-4D9D-8829-BD8ADA617F71", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha9.1:*:*:*:*:*:*", "matchCriteriaId": "0321315F-1AE4-4EB8-B701-094196E14689", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha9.2:*:*:*:*:*:*", "matchCriteriaId": "77710B2A-4AA6-4F2A-80DB-BEF3C08AC628", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:beta0:*:*:*:*:*:*", "matchCriteriaId": "43D725A4-1141-4A1E-910A-F458D5FBDF7E", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "9267A380-DAAE-4867-A40D-8CA2B15249CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:beta10:*:*:*:*:*:*", "matchCriteriaId": "1C52DD2F-1E79-4C8D-8842-E3DA892D72FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:beta11:*:*:*:*:*:*", "matchCriteriaId": "8A770C55-AA10-4BA9-954F-6F94FCDE6D77", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:beta12:*:*:*:*:*:*", "matchCriteriaId": "A11F1B45-461B-407B-A0C0-D53D17D33427", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:beta13:*:*:*:*:*:*", "matchCriteriaId": "878188D2-C6B0-4BA5-A920-7A8743BA1352", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:beta14:*:*:*:*:*:*", "matchCriteriaId": "474D3C4C-C5D6-400C-9543-7E42CB6DB3D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:beta15:*:*:*:*:*:*", "matchCriteriaId": "9B86604F-2CCD-49FA-9DE5-C9229F268E28", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:beta16:*:*:*:*:*:*", "matchCriteriaId": "8F5E4719-B67D-475B-83C7-EF9989A349A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:beta16.1:*:*:*:*:*:*", "matchCriteriaId": "66370EFF-1BE1-4641-8ADA-00851D335129", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:beta16.2:*:*:*:*:*:*", "matchCriteriaId": "C6280EBB-A0AE-477E-A49B-380D1C873E25", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:beta16.3:*:*:*:*:*:*", "matchCriteriaId": "2FA48F7B-3B19-462A-86FC-1BAB0400D401", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:beta16.4:*:*:*:*:*:*", "matchCriteriaId": "35259067-83E2-472E-85F8-15A1201ACE4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:beta16.5:*:*:*:*:*:*", "matchCriteriaId": "958DC7DA-9FAC-4BDD-B159-26663BCB4651", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:beta16.6:*:*:*:*:*:*", "matchCriteriaId": "A1F9EAB9-7BF7-43F4-84CF-11647C8707F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:beta16.7:*:*:*:*:*:*", "matchCriteriaId": "772C39A2-EFD9-442F-B5B5-9AE9E216247C", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:beta16.8:*:*:*:*:*:*", "matchCriteriaId": "9C3A062D-48B0-4FB0-9B9B-D446D315AD93", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:beta17:*:*:*:*:*:*", "matchCriteriaId": "01A38D6B-0D09-4FC0-B836-1304F61268B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:beta17.1:*:*:*:*:*:*", "matchCriteriaId": "490B0120-D1B7-4C8B-B398-2485291E9E5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:beta17.2:*:*:*:*:*:*", "matchCriteriaId": "34715564-49B1-4616-99B3-E3B11CF9564D", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:beta17.3:*:*:*:*:*:*", "matchCriteriaId": "875D15CF-0BCA-43B7-8E78-BD82DED81BE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:beta17.4:*:*:*:*:*:*", "matchCriteriaId": "1D5CD7D3-21B1-452F-8822-47CC9CA8BBE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:beta17.5:*:*:*:*:*:*", "matchCriteriaId": "01C664BC-113B-4E41-B193-44E04908D9BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:beta17.6:*:*:*:*:*:*", "matchCriteriaId": "901547DD-3ABB-4D27-A617-2F53DCF33A4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:beta17.7:*:*:*:*:*:*", "matchCriteriaId": "D7CB0457-0711-4823-A296-BBB14BC719CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "7C19783B-FD71-448A-9837-9CC185FAEE95", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "7C191BC7-1324-4D3D-8EC1-CA6B1A937AD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "3BD64614-E236-4556-963E-35089BB4BB93", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:beta5:*:*:*:*:*:*", "matchCriteriaId": "CF9D8992-E2A7-4D51-9CAC-151D99937A66", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:beta6:*:*:*:*:*:*", "matchCriteriaId": "88B2D61F-5348-49C1-B35E-B52B960EEC68", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:beta7:*:*:*:*:*:*", "matchCriteriaId": "1B5FAD26-9C56-4A7C-A158-648CBEE44F5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:beta8:*:*:*:*:*:*", "matchCriteriaId": "291A1ED4-786C-4917-8998-2308E31C8E30", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:beta9:*:*:*:*:*:*", "matchCriteriaId": "EAC43D60-CFF5-4FA9-9CE3-CFC6825EEAA7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Strapi framework before 3.0.0-beta.17.8 is vulnerable to Remote Code Execution in the Install and Uninstall Plugin components of the Admin panel, because it does not sanitize the plugin name, and attackers can inject arbitrary shell commands to be executed by the execa function." }, { "lang": "es", "value": "El framework Strapi versiones anteriores a 3.0.0-beta.17.8, es vulnerable a una Ejecuci\u00f3n de C\u00f3digo Remota en los componentes del Plugin de Instalaci\u00f3n y Desinstalaci\u00f3n del panel de Administraci\u00f3n, ya que no sanea el nombre del plugin y los atacantes pueden inyectar comandos de shell arbitrarios para ser ejecutados mediante la funci\u00f3n execa." } ], "id": "CVE-2019-19609", "lastModified": "2024-11-21T04:35:03.000", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-12-05T20:15:10.200", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/163940/Strapi-3.0.0-beta.17.7-Remote-Code-Execution.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/163950/Strapi-CMS-3.0.0-beta.17.4-Remote-Code-Execution.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://bittherapy.net/post/strapi-framework-remote-code-execution/" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/strapi/strapi/pull/4636" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/163940/Strapi-3.0.0-beta.17.7-Remote-Code-Execution.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/163950/Strapi-CMS-3.0.0-beta.17.4-Remote-Code-Execution.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://bittherapy.net/post/strapi-framework-remote-code-execution/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/strapi/strapi/pull/4636" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-06-12 15:15
Modified
2024-11-21 09:07
Severity ?
2.3 (Low) - CVSS:3.1/AV:A/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N
3.5 (Low) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N
3.5 (Low) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N
Summary
Strapi is an open-source content management system. Prior to version 4.19.1, a super admin can create a collection where an item in the collection has an association to another collection. When this happens, another user with Author Role can see the list of associated items they did not create. They should see nothing but their own items they created not all items ever created. Users should upgrade @strapi/plugin-content-manager to version 4.19.1 to receive a patch.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:strapi:strapi:*:*:*:*:*:*:*:*", "matchCriteriaId": "BDFAF527-F672-4CA8-80E4-896AA7FEA40B", "versionEndExcluding": "4.19.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Strapi is an open-source content management system. Prior to version 4.19.1, a super admin can create a collection where an item in the collection has an association to another collection. When this happens, another user with Author Role can see the list of associated items they did not create. They should see nothing but their own items they created not all items ever created. Users should upgrade @strapi/plugin-content-manager to version 4.19.1 to receive a patch." }, { "lang": "es", "value": "Strapi es un sistema de gesti\u00f3n de contenidos de c\u00f3digo abierto. Antes de la versi\u00f3n 4.19.1, un superadministrador pod\u00eda crear una colecci\u00f3n en la que un elemento de la colecci\u00f3n tuviera una asociaci\u00f3n con otra colecci\u00f3n. Cuando esto sucede, otro usuario con rol de autor puede ver la lista de elementos asociados que no cre\u00f3. No deber\u00edan ver nada m\u00e1s que los elementos que crearon, no todos los elementos creados alguna vez. Los usuarios deben actualizar @strapi/plugin-content-manager a la versi\u00f3n 4.19.1 para recibir un parche." } ], "id": "CVE-2024-29181", "lastModified": "2024-11-21T09:07:44.597", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 2.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 0.9, "impactScore": 1.4, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.1, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-06-12T15:15:50.873", "references": [ { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/strapi/strapi/commit/e1dfd4d9f1cab25cf6da3614c1975e4e508e01c6" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://github.com/strapi/strapi/security/advisories/GHSA-6j89-frxc-q26m" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/strapi/strapi/commit/e1dfd4d9f1cab25cf6da3614c1975e4e508e01c6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://github.com/strapi/strapi/security/advisories/GHSA-6j89-frxc-q26m" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-639" } ], "source": "security-advisories@github.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-639" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-07-13 21:15
Modified
2024-11-21 07:05
Severity ?
Summary
An unrestricted file upload vulnerability in the Add New Assets function of Strapi 4.1.12 allows attackers to conduct XSS attacks via a crafted PDF file. NOTE: the project documentation suggests that a user with the Media Library "Create (upload)" permission is supposed to be able to upload PDF files containing JavaScript, and that all files in a public assets folder are accessible to the outside world (unless the filename begins with a dot character). The administrator can choose to allow only image, video, and audio files (i.e., not PDF) if desired.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:strapi:strapi:4.1.12:-:*:*:*:*:*:*", "matchCriteriaId": "8EE98C5E-5CB7-48DF-B229-7078A54130C6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [ { "sourceIdentifier": "cve@mitre.org", "tags": [ "disputed" ] } ], "descriptions": [ { "lang": "en", "value": "An unrestricted file upload vulnerability in the Add New Assets function of Strapi 4.1.12 allows attackers to conduct XSS attacks via a crafted PDF file. NOTE: the project documentation suggests that a user with the Media Library \"Create (upload)\" permission is supposed to be able to upload PDF files containing JavaScript, and that all files in a public assets folder are accessible to the outside world (unless the filename begins with a dot character). The administrator can choose to allow only image, video, and audio files (i.e., not PDF) if desired." }, { "lang": "es", "value": "Una vulnerabilidad de carga de archivos sin restricciones en la funci\u00f3n Add New Assets de Strapi versi\u00f3n v4.1.12, permite a atacantes ejecutar c\u00f3digo arbitrario por medio de un archivo dise\u00f1ado" } ], "id": "CVE-2022-32114", "lastModified": "2024-11-21T07:05:47.067", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-07-13T21:15:08.083", "references": [ { "source": "cve@mitre.org", "url": "https://docs.strapi.io/dev-docs/configurations/public-assets" }, { "source": "cve@mitre.org", "url": "https://docs.strapi.io/user-docs/users-roles-permissions/configuring-administrator-roles" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://github.com/bypazs/strapi" }, { "source": "cve@mitre.org", "url": "https://github.com/strapi/strapi/blob/d9277d616b4478a3839e79e47330a4aaf167a2f1/packages/core/content-type-builder/admin/src/components/AllowedTypesSelect/index.js#L14" }, { "source": "cve@mitre.org", "url": "https://github.com/strapi/strapi/blob/d9277d616b4478a3839e79e47330a4aaf167a2f1/packages/core/upload/admin/src/components/MediaLibraryInput/index.js#L33" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://grimthereaperteam.medium.com/strapi-v4-1-12-unrestricted-file-upload-b993bfd07e4e" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://docs.strapi.io/dev-docs/configurations/public-assets" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://docs.strapi.io/user-docs/users-roles-permissions/configuring-administrator-roles" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://github.com/bypazs/strapi" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://github.com/strapi/strapi/blob/d9277d616b4478a3839e79e47330a4aaf167a2f1/packages/core/content-type-builder/admin/src/components/AllowedTypesSelect/index.js#L14" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://github.com/strapi/strapi/blob/d9277d616b4478a3839e79e47330a4aaf167a2f1/packages/core/upload/admin/src/components/MediaLibraryInput/index.js#L33" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://grimthereaperteam.medium.com/strapi-v4-1-12-unrestricted-file-upload-b993bfd07e4e" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-434" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-04-19 16:15
Modified
2025-02-05 17:15
Severity ?
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Summary
Strapi through 4.5.5 allows authenticated Server-Side Template Injection (SSTI) that can be exploited to execute arbitrary code on the server. A remote attacker with access to the Strapi admin panel can inject a crafted payload that executes code on the server into an email template that bypasses the validation checks that should prevent code execution.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://github.com/strapi/strapi/releases | Release Notes | |
cve@mitre.org | https://strapi.io/blog/security-disclosure-of-vulnerabilities-cve | Vendor Advisory | |
cve@mitre.org | https://www.ghostccamm.com/blog/multi_strapi_vulns/ | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/strapi/strapi/releases | Release Notes | |
af854a3a-2127-422b-91ae-364da2661108 | https://strapi.io/blog/security-disclosure-of-vulnerabilities-cve | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.ghostccamm.com/blog/multi_strapi_vulns/ | Exploit, Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:strapi:strapi:*:*:*:*:*:*:*:*", "matchCriteriaId": "00BEBFCA-2EDE-4A26-A13C-D14B4449CE06", "versionEndExcluding": "4.5.6", "versionStartIncluding": "3.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Strapi through 4.5.5 allows authenticated Server-Side Template Injection (SSTI) that can be exploited to execute arbitrary code on the server. A remote attacker with access to the Strapi admin panel can inject a crafted payload that executes code on the server into an email template that bypasses the validation checks that should prevent code execution." } ], "id": "CVE-2023-22621", "lastModified": "2025-02-05T17:15:13.307", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2023-04-19T16:15:07.213", "references": [ { "source": "cve@mitre.org", "tags": [ "Release Notes" ], "url": "https://github.com/strapi/strapi/releases" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://strapi.io/blog/security-disclosure-of-vulnerabilities-cve" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.ghostccamm.com/blog/multi_strapi_vulns/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes" ], "url": "https://github.com/strapi/strapi/releases" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://strapi.io/blog/security-disclosure-of-vulnerabilities-cve" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.ghostccamm.com/blog/multi_strapi_vulns/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-74" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-74" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2023-09-15 19:15
Modified
2024-11-21 08:09
Severity ?
5.8 (Medium) - CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N
5.7 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
5.7 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
Summary
Strapi is an open-source headless content management system. Prior to version 4.11.7, an unauthorized actor can get access to user reset password tokens if they have the configure view permissions. The `/content-manager/relations` route does not remove private fields or ensure that they can't be selected. This issue is fixed in version 4.11.7.
References
▼ | URL | Tags | |
---|---|---|---|
security-advisories@github.com | https://github.com/strapi/strapi/releases/tag/v4.11.7 | Release Notes | |
security-advisories@github.com | https://github.com/strapi/strapi/security/advisories/GHSA-v8gg-4mq2-88q4 | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/strapi/strapi/releases/tag/v4.11.7 | Release Notes | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/strapi/strapi/security/advisories/GHSA-v8gg-4mq2-88q4 | Exploit, Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:strapi:strapi:*:*:*:*:*:*:*:*", "matchCriteriaId": "8555152A-73A5-47F6-9322-1B280C703A56", "versionEndExcluding": "4.11.7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Strapi is an open-source headless content management system. Prior to version 4.11.7, an unauthorized actor can get access to user reset password tokens if they have the configure view permissions. The `/content-manager/relations` route does not remove private fields or ensure that they can\u0027t be selected. This issue is fixed in version 4.11.7." }, { "lang": "es", "value": "Strapi es un sistema de gesti\u00f3n de contenidos headless de c\u00f3digo abierto. Antes de la versi\u00f3n 4.11.7, un actor no autorizado puede obtener acceso a los tokens de restablecimiento de contrase\u00f1a del usuario si tiene permisos de visualizaci\u00f3n de la configuraci\u00f3n. La ruta `/content-manager/relations` no elimina campos privados ni garantiza que no se puedan seleccionar. Este problema se solucion\u00f3 en la versi\u00f3n 4.11.7." } ], "id": "CVE-2023-36472", "lastModified": "2024-11-21T08:09:46.987", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.3, "impactScore": 4.0, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.1, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-09-15T19:15:08.117", "references": [ { "source": "security-advisories@github.com", "tags": [ "Release Notes" ], "url": "https://github.com/strapi/strapi/releases/tag/v4.11.7" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/strapi/strapi/security/advisories/GHSA-v8gg-4mq2-88q4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes" ], "url": "https://github.com/strapi/strapi/releases/tag/v4.11.7" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/strapi/strapi/security/advisories/GHSA-v8gg-4mq2-88q4" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "security-advisories@github.com", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-06-12 15:15
Modified
2024-11-21 09:18
Severity ?
7.1 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N
8.1 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
8.1 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
Summary
Strapi is an open-source content management system. By combining two vulnerabilities (an `Open Redirect` and `session token sent as URL query parameter`) in @strapi/plugin-users-permissions before version 4.24.2, is its possible of an unauthenticated attacker to bypass authentication mechanisms and retrieve the 3rd party tokens. The attack requires user interaction (one click). Unauthenticated attackers can leverage two vulnerabilities to obtain an 3rd party token and the bypass authentication of Strapi apps. Users should upgrade @strapi/plugin-users-permissions to version 4.24.2 to receive a patch.
References
▼ | URL | Tags | |
---|---|---|---|
security-advisories@github.com | https://github.com/strapi/strapi/security/advisories/GHSA-wrvh-rcmr-9qfc | Exploit, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/strapi/strapi/security/advisories/GHSA-wrvh-rcmr-9qfc | Exploit, Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:strapi:strapi:*:*:*:*:*:*:*:*", "matchCriteriaId": "D0B5DAE3-AC23-48C9-B266-7315B643700A", "versionEndExcluding": "4.24.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Strapi is an open-source content management system. By combining two vulnerabilities (an `Open Redirect` and `session token sent as URL query parameter`) in @strapi/plugin-users-permissions before version 4.24.2, is its possible of an unauthenticated attacker to bypass authentication mechanisms and retrieve the 3rd party tokens. The attack requires user interaction (one click). Unauthenticated attackers can leverage two vulnerabilities to obtain an 3rd party token and the bypass authentication of Strapi apps. Users should upgrade @strapi/plugin-users-permissions to version 4.24.2 to receive a patch." }, { "lang": "es", "value": "Strapi es un sistema de gesti\u00f3n de contenidos de c\u00f3digo abierto. Al combinar dos vulnerabilidades (un `Open Redirect` y un `token de sesi\u00f3n enviado como par\u00e1metro de consulta de URL`) en @strapi/plugin-users-permissions antes de la versi\u00f3n 4.24.2, es posible que un atacante no autenticado evite los mecanismos de autenticaci\u00f3n y recupere the 3rd party tokens. El ataque requiere la interacci\u00f3n del usuario (un clic). Los atacantes no autenticados pueden aprovechar dos vulnerabilidades para obtener un token de terceros y evitar la autenticaci\u00f3n de las aplicaciones Strapi. Los usuarios deben actualizar @strapi/plugin-users-permissions a la versi\u00f3n 4.24.2 para recibir un parche." } ], "id": "CVE-2024-34065", "lastModified": "2024-11-21T09:18:00.980", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 4.2, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-06-12T15:15:51.460", "references": [ { "source": "security-advisories@github.com", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://github.com/strapi/strapi/security/advisories/GHSA-wrvh-rcmr-9qfc" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://github.com/strapi/strapi/security/advisories/GHSA-wrvh-rcmr-9qfc" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-294" }, { "lang": "en", "value": "CWE-601" } ], "source": "security-advisories@github.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-294" }, { "lang": "en", "value": "CWE-601" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-06-12 15:15
Modified
2024-11-21 09:13
Severity ?
5.3 (Medium) - CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Summary
Strapi is an open-source content management system. Prior to version 4.22.0, a denial-of-service vulnerability is present in the media upload process causing the server to crash without restarting, affecting either development and production environments. Usually, errors in the application cause it to log the error and keep it running for other clients. This behavior, in contrast, stops the server execution, making it unavailable for any clients until it's manually restarted. Any user with access to the file upload functionality is able to exploit this vulnerability, affecting applications running in both development mode and production mode as well. Users should upgrade @strapi/plugin-upload to version 4.22.0 to receive a patch.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:strapi:strapi:*:*:*:*:*:*:*:*", "matchCriteriaId": "EBA0E5D8-ACDD-4835-949C-0CA3401222DF", "versionEndExcluding": "4.22.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Strapi is an open-source content management system. Prior to version 4.22.0, a denial-of-service vulnerability is present in the media upload process causing the server to crash without restarting, affecting either development and production environments. Usually, errors in the application cause it to log the error and keep it running for other clients. This behavior, in contrast, stops the server execution, making it unavailable for any clients until it\u0027s manually restarted. Any user with access to the file upload functionality is able to exploit this vulnerability, affecting applications running in both development mode and production mode as well. Users should upgrade @strapi/plugin-upload to version 4.22.0 to receive a patch.\n" }, { "lang": "es", "value": "Strapi es un sistema de gesti\u00f3n de contenidos de c\u00f3digo abierto. Antes de la versi\u00f3n 4.22.0, hab\u00eda una vulnerabilidad de denegaci\u00f3n de servicio en el proceso de carga de medios que provocaba que el servidor fallara sin reiniciarse, lo que afectaba los entornos de desarrollo y producci\u00f3n. Por lo general, los errores en la aplicaci\u00f3n hacen que registre el error y lo mantenga ejecut\u00e1ndose para otros clientes. Este comportamiento, por el contrario, detiene la ejecuci\u00f3n del servidor, haci\u00e9ndolo no disponible para ning\u00fan cliente hasta que se reinicie manualmente. Cualquier usuario con acceso a la funci\u00f3n de carga de archivos puede aprovechar esta vulnerabilidad, lo que afecta tambi\u00e9n a las aplicaciones que se ejecutan tanto en modo de desarrollo como en modo de producci\u00f3n. Los usuarios deben actualizar @strapi/plugin-upload a la versi\u00f3n 4.22.0 para recibir un parche." } ], "id": "CVE-2024-31217", "lastModified": "2024-11-21T09:13:03.783", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 3.6, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-06-12T15:15:51.170", "references": [ { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/strapi/strapi/commit/a0da7e73e1496d835fe71a2febb14f70170135c7" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://github.com/strapi/strapi/security/advisories/GHSA-pm9q-xj9p-96pm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/strapi/strapi/commit/a0da7e73e1496d835fe71a2febb14f70170135c7" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://github.com/strapi/strapi/security/advisories/GHSA-pm9q-xj9p-96pm" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-248" } ], "source": "security-advisories@github.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-09-15 20:15
Modified
2024-11-21 08:13
Severity ?
7.3 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
Strapi is the an open-source headless content management system. Prior to version 4.12.1, there is a rate limit on the login function of Strapi's admin screen, but it is possible to circumvent it. Therefore, the possibility of unauthorized login by login brute force attack increases. Version 4.12.1 has a fix for this issue.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:strapi:strapi:*:*:*:*:*:*:*:*", "matchCriteriaId": "F8A80799-A87E-41E1-9D7B-9F27E85A29BD", "versionEndExcluding": "4.12.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Strapi is the an open-source headless content management system. Prior to version 4.12.1, there is a rate limit on the login function of Strapi\u0027s admin screen, but it is possible to circumvent it. Therefore, the possibility of unauthorized login by login brute force attack increases. Version 4.12.1 has a fix for this issue." }, { "lang": "es", "value": "Strapi es un sistema de gesti\u00f3n de contenidos headless de c\u00f3digo abierto. Antes de la versi\u00f3n 4.12.1, hab\u00eda un l\u00edmite de velocidad en la funci\u00f3n de inicio de sesi\u00f3n de la pantalla de administraci\u00f3n de Strapi, pero es posible evitarlo. Por lo tanto, aumenta la posibilidad de un inicio de sesi\u00f3n no autorizado mediante un ataque de fuerza bruta. La versi\u00f3n 4.12.1 tiene una soluci\u00f3n para este problema." } ], "id": "CVE-2023-38507", "lastModified": "2024-11-21T08:13:43.200", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.4, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-09-15T20:15:08.997", "references": [ { "source": "security-advisories@github.com", "tags": [ "Issue Tracking" ], "url": "https://github.com/strapi/strapi/blob/32d68f1f5677ed9a9a505b718c182c0a3f885426/packages/core/admin/server/middlewares/rateLimit.js#L31" }, { "source": "security-advisories@github.com", "tags": [ "Release Notes" ], "url": "https://github.com/strapi/strapi/releases/tag/v4.12.1" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/strapi/strapi/security/advisories/GHSA-24q2-59hm-rh9r" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking" ], "url": "https://github.com/strapi/strapi/blob/32d68f1f5677ed9a9a505b718c182c0a3f885426/packages/core/admin/server/middlewares/rateLimit.js#L31" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes" ], "url": "https://github.com/strapi/strapi/releases/tag/v4.12.1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/strapi/strapi/security/advisories/GHSA-24q2-59hm-rh9r" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-770" } ], "source": "security-advisories@github.com", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-05-19 18:15
Modified
2024-11-21 07:03
Severity ?
Summary
An authenticated user with access to the Strapi admin panel can view private and sensitive data, such as email and password reset tokens, for API users if content types accessible to the authenticated user contain relationships to API users (from:users-permissions). There are many scenarios in which such details from API users can leak in the JSON response within the admin panel, either through a direct or indirect relationship. Access to this information enables a user to compromise these users’ accounts if the password reset API endpoints have been enabled. In a worst-case scenario, a low-privileged user could get access to a high-privileged API account, and could read and modify any data as well as block access to both the admin panel and API by revoking privileges for all other users.
References
▼ | URL | Tags | |
---|---|---|---|
disclosure@synopsys.com | https://www.synopsys.com/blogs/software-security/cyrc-advisory-strapi | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.synopsys.com/blogs/software-security/cyrc-advisory-strapi | Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:strapi:strapi:*:*:*:*:*:*:*:*", "matchCriteriaId": "02E592C9-FFDC-4DB5-BF02-205DB10A18A9", "versionEndExcluding": "3.6.10", "versionStartIncluding": "3.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:*:*:*:*:*:*:*:*", "matchCriteriaId": "AED7B5F2-334A-4940-81DE-9F35D21AD01A", "versionEndExcluding": "4.1.10", "versionStartIncluding": "4.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An authenticated user with access to the Strapi admin panel can view private and sensitive data, such as email and password reset tokens, for API users if content types accessible to the authenticated user contain relationships to API users (from:users-permissions). There are many scenarios in which such details from API users can leak in the JSON response within the admin panel, either through a direct or indirect relationship. Access to this information enables a user to compromise these users\u2019 accounts if the password reset API endpoints have been enabled. In a worst-case scenario, a low-privileged user could get access to a high-privileged API account, and could read and modify any data as well as block access to both the admin panel and API by revoking privileges for all other users." }, { "lang": "es", "value": "Un usuario autenticado con acceso al panel de administraci\u00f3n de Strapi puede visualizar datos privados y confidenciales, como el correo electr\u00f3nico y los tokens de restablecimiento de contrase\u00f1a, para los usuarios de la API si los tipos de contenido accesibles para el usuario autenticado contienen relaciones con los usuarios de la API (from:users-permissions). Se presentan muchos escenarios en los que estos detalles de los usuarios de la API pueden filtrarse en la respuesta JSON dentro del panel de administraci\u00f3n, ya sea mediante una relaci\u00f3n directa o indirecta. El acceso a esta informaci\u00f3n permite a un usuario comprometer las cuentas de estos usuarios si los endpoints de la API de restablecimiento de contrase\u00f1a han sido habilitados. En el peor de los casos, un usuario con pocos privilegios podr\u00eda acceder a una cuenta de la API con altos privilegios, y podr\u00eda leer y modificar cualquier dato, as\u00ed como bloquear el acceso tanto al panel de administraci\u00f3n como a la API al revocar los privilegios de todos los dem\u00e1s usuarios" } ], "id": "CVE-2022-30618", "lastModified": "2024-11-21T07:03:02.257", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-05-19T18:15:09.637", "references": [ { "source": "disclosure@synopsys.com", "tags": [ "Third Party Advisory" ], "url": "https://www.synopsys.com/blogs/software-security/cyrc-advisory-strapi" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.synopsys.com/blogs/software-security/cyrc-advisory-strapi" } ], "sourceIdentifier": "disclosure@synopsys.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-212" } ], "source": "disclosure@synopsys.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-212" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-11-07 22:15
Modified
2024-11-21 04:33
Severity ?
Summary
strapi before 3.0.0-beta.17.5 mishandles password resets within packages/strapi-admin/controllers/Auth.js and packages/strapi-plugin-users-permissions/controllers/Auth.js.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:strapi:strapi:*:*:*:*:*:*:*:*", "matchCriteriaId": "A97983D3-FFBA-485E-8496-6489A9074853", "versionEndIncluding": "1.6.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha10.1:*:*:*:*:*:*", "matchCriteriaId": "3E72C7A0-197D-4324-BBB4-663223C52C7C", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha10.2:*:*:*:*:*:*", "matchCriteriaId": "954FDA03-9914-42DC-9AF0-81CB69BD0442", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha10.3:*:*:*:*:*:*", "matchCriteriaId": "7B4D7C63-F071-4572-BD81-65ABCA693A8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha11:*:*:*:*:*:*", "matchCriteriaId": "003189F7-77BD-416F-A253-C808E7E38A11", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha11.1:*:*:*:*:*:*", "matchCriteriaId": "A1DDFD47-7C0A-447F-9A34-F7690B28A4B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha11.2:*:*:*:*:*:*", "matchCriteriaId": "F3EA2B22-E04D-48FB-8BD9-9CD66598346A", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha11.3:*:*:*:*:*:*", "matchCriteriaId": "6F39E9F5-8AEE-4E26-A084-1BF813A65FFD", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha12:*:*:*:*:*:*", "matchCriteriaId": "31EC2516-DA0E-4710-AB98-11E1081764DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha12.1:*:*:*:*:*:*", "matchCriteriaId": "62C28A62-C16D-47D6-9D56-2B236287CBF6", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha12.1.3:*:*:*:*:*:*", "matchCriteriaId": "D000CAF1-B033-4CF6-B6B4-1A9C10239886", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha12.2:*:*:*:*:*:*", "matchCriteriaId": "C424AFC4-3DBA-4F69-A030-6B143ADEAE13", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha12.3:*:*:*:*:*:*", "matchCriteriaId": "1B8C9E2B-58B7-4938-BF34-BB2E4322F53F", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha12.4:*:*:*:*:*:*", "matchCriteriaId": "CE6F7CA0-11AE-45F0-B1AA-034A32CC0C5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha12.5:*:*:*:*:*:*", "matchCriteriaId": "F3747021-429C-4D16-A740-A9C69FA06561", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha12.6:*:*:*:*:*:*", "matchCriteriaId": "2E76C452-5545-4495-A671-4207A3DFE710", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha12.7:*:*:*:*:*:*", "matchCriteriaId": "6D493E54-F8BE-470D-B78C-EF2E48645BEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha12.7.1:*:*:*:*:*:*", "matchCriteriaId": "11C6D99B-67E0-4828-A812-EA987D585C75", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha13:*:*:*:*:*:*", "matchCriteriaId": "D6D0EA14-3E88-491D-9522-5F9F2F968329", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha13.0.1:*:*:*:*:*:*", "matchCriteriaId": "38DF3333-7B40-41A1-8C1A-EE644867193C", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha13.1:*:*:*:*:*:*", "matchCriteriaId": "ECC59C0A-60C1-4DC7-B127-D512271DA491", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha14:*:*:*:*:*:*", "matchCriteriaId": "17CA9542-43DC-4D7D-A159-D7D56639EE46", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha14.1:*:*:*:*:*:*", "matchCriteriaId": "1826129C-FF15-4422-97CA-F383E6F86B36", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha14.1.1:*:*:*:*:*:*", "matchCriteriaId": "95509917-C33A-43C1-9043-D9618884FDF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha14.2:*:*:*:*:*:*", "matchCriteriaId": "2CF2A7C5-F97C-447B-977D-243321CD807D", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha14.3:*:*:*:*:*:*", "matchCriteriaId": "0A4DF814-73F9-4D04-87BD-03839E7E5BD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha14.4.0:*:*:*:*:*:*", "matchCriteriaId": "4198B34C-CFE0-46AD-A2D6-926F5A037759", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha14.5:*:*:*:*:*:*", "matchCriteriaId": "76B25EF2-EFB6-4626-AC51-209523A1342E", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha15:*:*:*:*:*:*", "matchCriteriaId": "D15150B6-8B20-496A-BD97-F598E2C243AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha16:*:*:*:*:*:*", "matchCriteriaId": "39C8378E-BBFC-48D0-B69B-ED034BAA100C", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha17:*:*:*:*:*:*", "matchCriteriaId": "006A3591-8908-4B9A-A3BA-C2136FC6B009", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha18:*:*:*:*:*:*", "matchCriteriaId": "1E85C03D-DA48-4F2D-A995-0FC82B61327D", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha19:*:*:*:*:*:*", "matchCriteriaId": "1F314776-5157-488E-B7A8-B074BC31CC63", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha20:*:*:*:*:*:*", "matchCriteriaId": "80EF6FFD-318D-42C7-A5E0-FD2B9E561F68", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha21:*:*:*:*:*:*", "matchCriteriaId": "B46002D9-0AD1-48F2-9CE0-6ECD2AE166DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha22:*:*:*:*:*:*", "matchCriteriaId": "5184E9EB-396B-412D-88F5-A852F8D74289", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha23:*:*:*:*:*:*", "matchCriteriaId": "149771DC-DE72-43DB-9B5C-3717B7078FB6", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha23.1:*:*:*:*:*:*", "matchCriteriaId": "2A67962C-D35B-408A-BD74-0B4647B81A23", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha24:*:*:*:*:*:*", "matchCriteriaId": "31083AE3-3D91-4F23-AE4C-2EB08FF4BAF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha24.1:*:*:*:*:*:*", "matchCriteriaId": "651B10C1-918E-4F6C-970B-45FA9DDE83E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha25:*:*:*:*:*:*", "matchCriteriaId": "20A37EAD-A610-450B-8DC2-A8208200E641", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha25.1:*:*:*:*:*:*", "matchCriteriaId": "836A2C35-38D8-4ED6-B87D-2003C2F3A445", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha25.2:*:*:*:*:*:*", "matchCriteriaId": "4153D69D-D158-4AFF-9936-A944B0F7F8E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha26:*:*:*:*:*:*", "matchCriteriaId": "09EA2597-2BA4-4747-9B52-E4E713594A00", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha26.1:*:*:*:*:*:*", "matchCriteriaId": "19C9D4D8-978A-431C-B39C-80AB7B22D7D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha26.2:*:*:*:*:*:*", "matchCriteriaId": "9423DAF3-6295-4B9D-9B99-CAA9EE698548", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha4:*:*:*:*:*:*", "matchCriteriaId": "021CE25F-44BD-403C-89EB-91127319B7B8", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha4.8:*:*:*:*:*:*", "matchCriteriaId": "54039D06-9AE2-4B83-A7D4-80177A3A5F56", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha5.3:*:*:*:*:*:*", "matchCriteriaId": "98503595-C247-499B-8654-424004FAA263", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha5.5:*:*:*:*:*:*", "matchCriteriaId": "6EE84452-19EC-41BE-9075-D48FA4BFD230", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha6.3:*:*:*:*:*:*", "matchCriteriaId": "01E106C1-EF1B-4768-AB51-19FEA9597558", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha6.4:*:*:*:*:*:*", "matchCriteriaId": "61CE8F6A-7D01-45EE-8EB9-39AE0D2BDB09", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha6.7:*:*:*:*:*:*", "matchCriteriaId": "73C9DB4F-266C-4180-A1C1-8DA14854B52C", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha7.2:*:*:*:*:*:*", "matchCriteriaId": "07D25069-D60A-4E25-9817-575F555AE176", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha7.3:*:*:*:*:*:*", "matchCriteriaId": "1377CFAD-6C86-4A7B-AEDC-26ACBE6C4AC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha8:*:*:*:*:*:*", "matchCriteriaId": "7066F2B2-B0B1-4922-972A-F0B8963FC594", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha8.3:*:*:*:*:*:*", "matchCriteriaId": "AD5E0CEF-E30E-4828-891B-056A7FC29951", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha9:*:*:*:*:*:*", "matchCriteriaId": "FA634AA2-114D-4D9D-8829-BD8ADA617F71", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha9.1:*:*:*:*:*:*", "matchCriteriaId": "0321315F-1AE4-4EB8-B701-094196E14689", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha9.2:*:*:*:*:*:*", "matchCriteriaId": "77710B2A-4AA6-4F2A-80DB-BEF3C08AC628", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:beta0:*:*:*:*:*:*", "matchCriteriaId": "43D725A4-1141-4A1E-910A-F458D5FBDF7E", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "9267A380-DAAE-4867-A40D-8CA2B15249CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:beta10:*:*:*:*:*:*", "matchCriteriaId": "1C52DD2F-1E79-4C8D-8842-E3DA892D72FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:beta11:*:*:*:*:*:*", "matchCriteriaId": "8A770C55-AA10-4BA9-954F-6F94FCDE6D77", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:beta12:*:*:*:*:*:*", "matchCriteriaId": "A11F1B45-461B-407B-A0C0-D53D17D33427", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:beta13:*:*:*:*:*:*", "matchCriteriaId": "878188D2-C6B0-4BA5-A920-7A8743BA1352", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:beta14:*:*:*:*:*:*", "matchCriteriaId": "474D3C4C-C5D6-400C-9543-7E42CB6DB3D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:beta15:*:*:*:*:*:*", "matchCriteriaId": "9B86604F-2CCD-49FA-9DE5-C9229F268E28", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:beta16:*:*:*:*:*:*", "matchCriteriaId": "8F5E4719-B67D-475B-83C7-EF9989A349A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:beta16.1:*:*:*:*:*:*", "matchCriteriaId": "66370EFF-1BE1-4641-8ADA-00851D335129", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:beta16.2:*:*:*:*:*:*", "matchCriteriaId": "C6280EBB-A0AE-477E-A49B-380D1C873E25", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:beta16.3:*:*:*:*:*:*", "matchCriteriaId": "2FA48F7B-3B19-462A-86FC-1BAB0400D401", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:beta16.4:*:*:*:*:*:*", "matchCriteriaId": "35259067-83E2-472E-85F8-15A1201ACE4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:beta16.5:*:*:*:*:*:*", "matchCriteriaId": "958DC7DA-9FAC-4BDD-B159-26663BCB4651", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:beta16.6:*:*:*:*:*:*", "matchCriteriaId": "A1F9EAB9-7BF7-43F4-84CF-11647C8707F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:beta16.7:*:*:*:*:*:*", "matchCriteriaId": "772C39A2-EFD9-442F-B5B5-9AE9E216247C", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:beta16.8:*:*:*:*:*:*", "matchCriteriaId": "9C3A062D-48B0-4FB0-9B9B-D446D315AD93", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:beta17:*:*:*:*:*:*", "matchCriteriaId": "01A38D6B-0D09-4FC0-B836-1304F61268B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:beta17.1:*:*:*:*:*:*", "matchCriteriaId": "490B0120-D1B7-4C8B-B398-2485291E9E5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:beta17.2:*:*:*:*:*:*", "matchCriteriaId": "34715564-49B1-4616-99B3-E3B11CF9564D", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:beta17.3:*:*:*:*:*:*", "matchCriteriaId": "875D15CF-0BCA-43B7-8E78-BD82DED81BE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:beta17.4:*:*:*:*:*:*", "matchCriteriaId": "1D5CD7D3-21B1-452F-8822-47CC9CA8BBE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "7C19783B-FD71-448A-9837-9CC185FAEE95", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "7C191BC7-1324-4D3D-8EC1-CA6B1A937AD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "3BD64614-E236-4556-963E-35089BB4BB93", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:beta5:*:*:*:*:*:*", "matchCriteriaId": "CF9D8992-E2A7-4D51-9CAC-151D99937A66", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:beta6:*:*:*:*:*:*", "matchCriteriaId": "88B2D61F-5348-49C1-B35E-B52B960EEC68", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:beta7:*:*:*:*:*:*", "matchCriteriaId": "1B5FAD26-9C56-4A7C-A158-648CBEE44F5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:beta8:*:*:*:*:*:*", "matchCriteriaId": "291A1ED4-786C-4917-8998-2308E31C8E30", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:beta9:*:*:*:*:*:*", "matchCriteriaId": "EAC43D60-CFF5-4FA9-9CE3-CFC6825EEAA7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "strapi before 3.0.0-beta.17.5 mishandles password resets within packages/strapi-admin/controllers/Auth.js and packages/strapi-plugin-users-permissions/controllers/Auth.js." }, { "lang": "es", "value": "strapi versiones anteriores a 3.0.0-beta.17.5, maneja inapropiadamente los restablecimientos de contrase\u00f1a dentro de los archivos packages/strapi-admin/controllers/Auth.js y packages/strapi-plugin-users-permissions/controllers/Auth.js." } ], "id": "CVE-2019-18818", "lastModified": "2024-11-21T04:33:38.113", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-11-07T22:15:10.570", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/163939/Strapi-3.0.0-beta-Authentication-Bypass.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/163950/Strapi-CMS-3.0.0-beta.17.4-Remote-Code-Execution.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/165896/Strapi-CMS-3.0.0-beta.17.4-Privilege-Escalation.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/strapi/strapi/pull/4443" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/strapi/strapi/releases/tag/v3.0.0-beta.17.5" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.npmjs.com/advisories/1311" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/163939/Strapi-3.0.0-beta-Authentication-Bypass.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/163950/Strapi-CMS-3.0.0-beta.17.4-Remote-Code-Execution.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/165896/Strapi-CMS-3.0.0-beta.17.4-Privilege-Escalation.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/strapi/strapi/pull/4443" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/strapi/strapi/releases/tag/v3.0.0-beta.17.5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.npmjs.com/advisories/1311" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-640" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-06-20 19:15
Modified
2025-06-20 19:09
Severity ?
Summary
Strapi v4.24.4 was discovered to contain a Server-Side Request Forgery (SSRF) via the component /strapi.io/_next/image. This vulnerability allows attackers to scan for open ports or access sensitive information via a crafted GET request. NOTE: The Strapi Development Community argues that this issue is not valid. They contend that "the strapi/admin was wrongly attributed a flaw that only pertains to the strapi.io website, and which, at the end of the day, does not pose any real SSRF risk to applications that make use of the Strapi library."
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://medium.com/%40barkadevaibhav491/server-side-request-forgery-in-strapi-e02d5fe218ab | Exploit, Third Party Advisory | |
cve@mitre.org | https://strapi.io/ | Product | |
af854a3a-2127-422b-91ae-364da2661108 | https://medium.com/%40barkadevaibhav491/server-side-request-forgery-in-strapi-e02d5fe218ab | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://strapi.io/ | Product |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:strapi:strapi:4.24.4:*:*:*:*:*:*:*", "matchCriteriaId": "E8B3DCE4-B469-43ED-8898-9CC9F7720BAD", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [ { "sourceIdentifier": "cve@mitre.org", "tags": [ "disputed" ] } ], "descriptions": [ { "lang": "en", "value": "Strapi v4.24.4 was discovered to contain a Server-Side Request Forgery (SSRF) via the component /strapi.io/_next/image. This vulnerability allows attackers to scan for open ports or access sensitive information via a crafted GET request. NOTE: The Strapi Development Community argues that this issue is not valid. They contend that \"the strapi/admin was wrongly attributed a flaw that only pertains to the strapi.io website, and which, at the end of the day, does not pose any real SSRF risk to applications that make use of the Strapi library.\"" }, { "lang": "es", "value": "Se descubri\u00f3 que Strapi v4.24.4 conten\u00eda Server-Side Request Forgeryr (SSRF) a trav\u00e9s del componente /strapi.io/_next/image. Esta vulnerabilidad permite a los atacantes escanear en busca de puertos abiertos o acceder a informaci\u00f3n confidencial mediante una solicitud GET manipulada." } ], "id": "CVE-2024-37818", "lastModified": "2025-06-20T19:09:37.573", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 4.0, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2024-06-20T19:15:50.260", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://medium.com/%40barkadevaibhav491/server-side-request-forgery-in-strapi-e02d5fe218ab" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://strapi.io/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://medium.com/%40barkadevaibhav491/server-side-request-forgery-in-strapi-e02d5fe218ab" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://strapi.io/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-918" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2020-10-22 19:15
Modified
2024-11-21 05:21
Severity ?
Summary
In Strapi before 3.2.5, there is no admin::hasPermissions restriction for CTB (aka content-type-builder) routes.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://github.com/strapi/strapi/pull/8439 | Patch, Third Party Advisory | |
cve@mitre.org | https://github.com/strapi/strapi/releases/tag/v3.2.5 | Release Notes, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/strapi/strapi/pull/8439 | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/strapi/strapi/releases/tag/v3.2.5 | Release Notes, Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:strapi:strapi:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4C05BD6-1646-4105-B1B2-F8D781D796FA", "versionEndExcluding": "3.2.5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Strapi before 3.2.5, there is no admin::hasPermissions restriction for CTB (aka content-type-builder) routes." }, { "lang": "es", "value": "En Strapi versiones anteriores a 3.2.5, no existe ninguna restricci\u00f3n de admin::hasPermissions para las rutas CTB (tambi\u00e9n se conoce como content-type-builder)" } ], "id": "CVE-2020-27665", "lastModified": "2024-11-21T05:21:37.600", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-10-22T19:15:13.887", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/strapi/strapi/pull/8439" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/strapi/strapi/releases/tag/v3.2.5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/strapi/strapi/pull/8439" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/strapi/strapi/releases/tag/v3.2.5" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-276" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-06-19 17:15
Modified
2024-11-21 05:02
Severity ?
Summary
Strapi before 3.0.2 could allow a remote authenticated attacker to bypass security restrictions because templates are stored in a global variable without any sanitation. By sending a specially crafted request, an attacker could exploit this vulnerability to update the email template for both password reset and account confirmation emails.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/183045 | Third Party Advisory, VDB Entry | |
cve@mitre.org | https://github.com/strapi/strapi/pull/6599 | Third Party Advisory | |
cve@mitre.org | https://github.com/strapi/strapi/releases/tag/v3.0.2 | Release Notes, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/183045 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/strapi/strapi/pull/6599 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/strapi/strapi/releases/tag/v3.0.2 | Release Notes, Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:strapi:strapi:*:*:*:*:*:*:*:*", "matchCriteriaId": "B91A6214-D919-4936-9793-2963C9E6E8EB", "versionEndExcluding": "3.0.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Strapi before 3.0.2 could allow a remote authenticated attacker to bypass security restrictions because templates are stored in a global variable without any sanitation. By sending a specially crafted request, an attacker could exploit this vulnerability to update the email template for both password reset and account confirmation emails." }, { "lang": "es", "value": "Strapi versiones anteriores a 3.0.2, podr\u00eda permitir a un atacante autenticado remoto omitir restricciones de seguridad porque las plantillas son almacenadas en una variable global sin ning\u00fan tipo de saneamiento. Mediante el env\u00edo de una petici\u00f3n especialmente dise\u00f1ada, un atacante podr\u00eda explotar esta vulnerabilidad para actualizar la plantilla de correo electr\u00f3nico tanto para el restablecimiento de contrase\u00f1a como para los correos electr\u00f3nicos de confirmaci\u00f3n de cuenta" } ], "id": "CVE-2020-13961", "lastModified": "2024-11-21T05:02:14.807", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-06-19T17:15:14.147", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/183045" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/strapi/strapi/pull/6599" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/strapi/strapi/releases/tag/v3.0.2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/183045" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/strapi/strapi/pull/6599" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/strapi/strapi/releases/tag/v3.0.2" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-05-06 14:15
Modified
2024-11-21 05:59
Severity ?
Summary
In Strapi through 3.6.0, the admin panel allows the changing of one's own password without entering the current password. An attacker who gains access to a valid session can use this to take over an account by changing the password.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://github.com/strapi/strapi/releases | Release Notes, Third Party Advisory | |
cve@mitre.org | https://strapi.io/changelog | Release Notes, Vendor Advisory | |
cve@mitre.org | https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-008.txt | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/strapi/strapi/releases | Release Notes, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://strapi.io/changelog | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-008.txt | Exploit, Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:strapi:strapi:*:*:*:*:*:*:*:*", "matchCriteriaId": "A0CF9A9D-4E22-4BFB-9D9D-A781FCA2216E", "versionEndIncluding": "3.6.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Strapi through 3.6.0, the admin panel allows the changing of one\u0027s own password without entering the current password. An attacker who gains access to a valid session can use this to take over an account by changing the password." }, { "lang": "es", "value": "En Strapi versiones versiones hasta 3.6.0, el panel de administraci\u00f3n permite el cambio de la propia contrase\u00f1a sin ingresar la contrase\u00f1a actual.\u0026#xa0;Un atacante que consigue acceso a una sesi\u00f3n v\u00e1lida puede usar esto para apoderarse de una cuenta al cambiar la contrase\u00f1a" } ], "id": "CVE-2021-28128", "lastModified": "2024-11-21T05:59:08.400", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 5.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-05-06T14:15:08.417", "references": [ { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/strapi/strapi/releases" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://strapi.io/changelog" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-008.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/strapi/strapi/releases" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://strapi.io/changelog" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-008.txt" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-640" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-10-22 19:15
Modified
2024-11-21 05:21
Severity ?
Summary
Strapi before 3.2.5 has stored XSS in the wysiwyg editor's preview feature.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://github.com/strapi/strapi/pull/8440 | Patch, Third Party Advisory | |
cve@mitre.org | https://github.com/strapi/strapi/releases/tag/v3.2.5 | Release Notes, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/strapi/strapi/pull/8440 | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/strapi/strapi/releases/tag/v3.2.5 | Release Notes, Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:strapi:strapi:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4C05BD6-1646-4105-B1B2-F8D781D796FA", "versionEndExcluding": "3.2.5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Strapi before 3.2.5 has stored XSS in the wysiwyg editor\u0027s preview feature." }, { "lang": "es", "value": "Strapi versiones anteriores a 3.2.5, presenta una vulnerabilidad de tipo XSS almacenado en la funcionalidad de vista previa de wysiwyg editor" } ], "id": "CVE-2020-27666", "lastModified": "2024-11-21T05:21:37.737", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-10-22T19:15:13.963", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/strapi/strapi/pull/8440" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/strapi/strapi/releases/tag/v3.2.5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/strapi/strapi/pull/8440" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/strapi/strapi/releases/tag/v3.2.5" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-02-26 15:15
Modified
2024-11-21 06:39
Severity ?
Summary
Arbitrary Command Injection in GitHub repository strapi/strapi prior to 4.1.0.
References
▼ | URL | Tags | |
---|---|---|---|
security@huntr.dev | https://github.com/strapi/strapi/commit/2a3f5e988be6a2c7dae5ac22b9e86d579b462f4c | Patch, Third Party Advisory | |
security@huntr.dev | https://github.com/strapi/strapi/issues/12879 | Issue Tracking, Third Party Advisory | |
security@huntr.dev | https://huntr.dev/bounties/001d1c29-805a-4035-93bb-71a0e81da3e5 | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/strapi/strapi/commit/2a3f5e988be6a2c7dae5ac22b9e86d579b462f4c | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/strapi/strapi/issues/12879 | Issue Tracking, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://huntr.dev/bounties/001d1c29-805a-4035-93bb-71a0e81da3e5 | Exploit, Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:strapi:strapi:*:*:*:*:*:*:*:*", "matchCriteriaId": "412D3B41-C0FD-4ED9-AD6B-00C83BEBC0C7", "versionEndExcluding": "4.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Arbitrary Command Injection in GitHub repository strapi/strapi prior to 4.1.0." }, { "lang": "es", "value": "Una Inyecci\u00f3n Arbitraria de Comandos en el repositorio de GitHub strapi/strapi versiones anteriores a 4.1.0.\n" } ], "id": "CVE-2022-0764", "lastModified": "2024-11-21T06:39:20.873", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:L", "version": "3.0" }, "exploitabilityScore": 0.6, "impactScore": 5.5, "source": "security@huntr.dev", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-02-26T15:15:07.910", "references": [ { "source": "security@huntr.dev", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/strapi/strapi/commit/2a3f5e988be6a2c7dae5ac22b9e86d579b462f4c" }, { "source": "security@huntr.dev", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/strapi/strapi/issues/12879" }, { "source": "security@huntr.dev", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://huntr.dev/bounties/001d1c29-805a-4035-93bb-71a0e81da3e5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/strapi/strapi/commit/2a3f5e988be6a2c7dae5ac22b9e86d579b462f4c" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/strapi/strapi/issues/12879" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://huntr.dev/bounties/001d1c29-805a-4035-93bb-71a0e81da3e5" } ], "sourceIdentifier": "security@huntr.dev", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "security@huntr.dev", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-07-25 18:15
Modified
2024-11-21 08:06
Severity ?
8.6 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Summary
Strapi is an open-source headless content management system. Prior to version 4.10.8, it is possible to leak private fields if one is using the `t(number)` prefix. Knex query allows users to change the default prefix. For example, if someone changes the prefix to be the same as it was before or to another table they want to query, the query changes from `password` to `t1.password`. `password` is protected by filtering protections but `t1.password` is not protected. This can lead to filtering attacks on everything related to the object again, including admin passwords and reset-tokens. Version 4.10.8 fixes this issue.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:strapi:strapi:*:*:*:*:*:*:*:*", "matchCriteriaId": "BA7C9D2E-E4B5-4BA7-9174-51A805D34E39", "versionEndExcluding": "4.10.8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Strapi is an open-source headless content management system. Prior to version 4.10.8, it is possible to leak private fields if one is using the `t(number)` prefix. Knex query allows users to change the default prefix. For example, if someone changes the prefix to be the same as it was before or to another table they want to query, the query changes from `password` to `t1.password`. `password` is protected by filtering protections but `t1.password` is not protected. This can lead to filtering attacks on everything related to the object again, including admin passwords and reset-tokens. Version 4.10.8 fixes this issue." } ], "id": "CVE-2023-34235", "lastModified": "2024-11-21T08:06:49.747", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 4.0, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-07-25T18:15:10.800", "references": [ { "source": "security-advisories@github.com", "tags": [ "Release Notes" ], "url": "https://github.com/strapi/strapi/releases/tag/v4.10.8" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://github.com/strapi/strapi/security/advisories/GHSA-9xg4-3qfm-9w8f" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes" ], "url": "https://github.com/strapi/strapi/releases/tag/v4.10.8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://github.com/strapi/strapi/security/advisories/GHSA-9xg4-3qfm-9w8f" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "security-advisories@github.com", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-09-27 23:15
Modified
2025-05-22 14:15
Severity ?
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
Strapi before 3.6.10 and 4.x before 4.1.10 mishandles hidden attributes within admin API responses.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://github.com/kos0ng/CVEs/tree/main/CVE-2022-31367 | Exploit, Third Party Advisory | |
cve@mitre.org | https://github.com/strapi/strapi/releases/tag/v3.6.10 | Release Notes, Third Party Advisory | |
cve@mitre.org | https://github.com/strapi/strapi/releases/tag/v4.1.10 | Release Notes, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/kos0ng/CVEs/tree/main/CVE-2022-31367 | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/strapi/strapi/releases/tag/v3.6.10 | Release Notes, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/strapi/strapi/releases/tag/v4.1.10 | Release Notes, Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:strapi:strapi:*:*:*:*:*:*:*:*", "matchCriteriaId": "C9587D86-3247-48CB-B0EB-A4BD4D500E83", "versionEndExcluding": "3.6.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:*:*:*:*:*:*:*:*", "matchCriteriaId": "AED7B5F2-334A-4940-81DE-9F35D21AD01A", "versionEndExcluding": "4.1.10", "versionStartIncluding": "4.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Strapi before 3.6.10 and 4.x before 4.1.10 mishandles hidden attributes within admin API responses." }, { "lang": "es", "value": "Strapi versiones anteriores a 3.6.10 y 4.x anteriores a 4.1.10, maneja inapropiadamente los atributos ocultos dentro de las respuestas de la API de administraci\u00f3n" } ], "id": "CVE-2022-31367", "lastModified": "2025-05-22T14:15:58.060", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2022-09-27T23:15:13.617", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/kos0ng/CVEs/tree/main/CVE-2022-31367" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/strapi/strapi/releases/tag/v3.6.10" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/strapi/strapi/releases/tag/v4.1.10" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/kos0ng/CVEs/tree/main/CVE-2022-31367" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/strapi/strapi/releases/tag/v3.6.10" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/strapi/strapi/releases/tag/v4.1.10" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2023-09-15 19:15
Modified
2024-11-21 08:11
Severity ?
6.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N
2.7 (Low) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
2.7 (Low) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
Summary
Strapi is the an open-source headless content management system. Prior to version 4.12.1, field level permissions are not respected in the relationship title. If an actor has relationship title and the relationship shows a field they don't have permission to see, the field will still be visible. Version 4.12.1 has a fix for this issue.
References
▼ | URL | Tags | |
---|---|---|---|
security-advisories@github.com | https://github.com/strapi/strapi/releases/tag/v4.12.1 | Release Notes | |
security-advisories@github.com | https://github.com/strapi/strapi/security/advisories/GHSA-m284-85mf-cgrc | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/strapi/strapi/releases/tag/v4.12.1 | Release Notes | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/strapi/strapi/security/advisories/GHSA-m284-85mf-cgrc | Exploit, Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:strapi:strapi:*:*:*:*:*:*:*:*", "matchCriteriaId": "F8A80799-A87E-41E1-9D7B-9F27E85A29BD", "versionEndExcluding": "4.12.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Strapi is the an open-source headless content management system. Prior to version 4.12.1, field level permissions are not respected in the relationship title. If an actor has relationship title and the relationship shows a field they don\u0027t have permission to see, the field will still be visible. Version 4.12.1 has a fix for this issue." }, { "lang": "es", "value": "Strapi es un sistema de gesti\u00f3n de contenidos headless de c\u00f3digo abierto. Antes de la versi\u00f3n 4.12.1, los permisos a nivel de campo no se respetaban en el t\u00edtulo de la relaci\u00f3n. Si un actor tiene un t\u00edtulo de relaci\u00f3n y la relaci\u00f3n muestra un campo para el que no tiene permiso para ver, el campo seguir\u00e1 estando visible. La versi\u00f3n 4.12.1 tiene una soluci\u00f3n para este problema." } ], "id": "CVE-2023-37263", "lastModified": "2024-11-21T08:11:20.737", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 4.0, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 2.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-09-15T19:15:08.637", "references": [ { "source": "security-advisories@github.com", "tags": [ "Release Notes" ], "url": "https://github.com/strapi/strapi/releases/tag/v4.12.1" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/strapi/strapi/security/advisories/GHSA-m284-85mf-cgrc" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes" ], "url": "https://github.com/strapi/strapi/releases/tag/v4.12.1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/strapi/strapi/security/advisories/GHSA-m284-85mf-cgrc" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "security-advisories@github.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-400" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2022-06-13 05:15
Modified
2024-11-21 06:59
Severity ?
Summary
Strapi v3.x.x versions and earlier contain a stored cross-site scripting vulnerability in file upload function. By exploiting this vulnerability, an arbitrary script may be executed on the web browser of the user who is logging in to the product with the administrative privilege.
References
▼ | URL | Tags | |
---|---|---|---|
vultures@jpcert.or.jp | https://github.com/strapi/strapi | Product, Third Party Advisory | |
vultures@jpcert.or.jp | https://jvn.jp/en/jp/JVN44550983/index.html | Third Party Advisory | |
vultures@jpcert.or.jp | https://strapi.io/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/strapi/strapi | Product, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://jvn.jp/en/jp/JVN44550983/index.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://strapi.io/ | Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:strapi:strapi:*:*:*:*:*:*:*:*", "matchCriteriaId": "901D5E3A-58A8-4BA9-A63B-2F7E86D31A20", "versionEndIncluding": "3.6.10", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Strapi v3.x.x versions and earlier contain a stored cross-site scripting vulnerability in file upload function. By exploiting this vulnerability, an arbitrary script may be executed on the web browser of the user who is logging in to the product with the administrative privilege." }, { "lang": "es", "value": "Strapi versiones v3.x.x y anteriores, contienen una vulnerabilidad de tipo cross-site scripting almacenada en la funci\u00f3n file upload. Al explotar esta vulnerabilidad, puede ejecutarse un script arbitrario en el navegador web del usuario que est\u00e1 iniciando sesi\u00f3n en el producto con el privilegio administrativo" } ], "id": "CVE-2022-29894", "lastModified": "2024-11-21T06:59:55.433", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-06-13T05:15:11.357", "references": [ { "source": "vultures@jpcert.or.jp", "tags": [ "Product", "Third Party Advisory" ], "url": "https://github.com/strapi/strapi" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Third Party Advisory" ], "url": "https://jvn.jp/en/jp/JVN44550983/index.html" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Vendor Advisory" ], "url": "https://strapi.io/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product", "Third Party Advisory" ], "url": "https://github.com/strapi/strapi" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://jvn.jp/en/jp/JVN44550983/index.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://strapi.io/" } ], "sourceIdentifier": "vultures@jpcert.or.jp", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2025-05-29 09:15
Modified
2025-06-24 18:27
Severity ?
4.9 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Summary
Strapi is an open-source content management system. Prior to version 4.25.2, inputting a local domain into the Webhooks URL field leads to the application fetching itself, resulting in a server side request forgery (SSRF). This issue has been patched in version 4.25.2.
References
▼ | URL | Tags | |
---|---|---|---|
security-advisories@github.com | https://github.com/strapi/strapi/security/advisories/GHSA-v8wj-f5c7-pvxf | Exploit, Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:strapi:strapi:*:*:*:*:*:*:*:*", "matchCriteriaId": "128D5142-48F9-4B17-8D63-AEE69B8D1F41", "versionEndExcluding": "4.25.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Strapi is an open-source content management system. Prior to version 4.25.2, inputting a local domain into the Webhooks URL field leads to the application fetching itself, resulting in a server side request forgery (SSRF). This issue has been patched in version 4.25.2." }, { "lang": "es", "value": "Strapi es un sistema de gesti\u00f3n de contenido de c\u00f3digo abierto. Antes de la versi\u00f3n 4.25.2, introducir un dominio local en el campo URL de Webhooks provocaba que la aplicaci\u00f3n se recuperara a s\u00ed misma, lo que resultaba en un server side request forgery (SSRF). Este problema se ha corregido en la versi\u00f3n 4.25.2." } ], "id": "CVE-2024-52588", "lastModified": "2025-06-24T18:27:42.593", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 3.6, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2025-05-29T09:15:25.350", "references": [ { "source": "security-advisories@github.com", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://github.com/strapi/strapi/security/advisories/GHSA-v8wj-f5c7-pvxf" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-918" } ], "source": "security-advisories@github.com", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-04-19 16:15
Modified
2025-02-05 17:15
Severity ?
4.9 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
4.9 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
4.9 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
Summary
Strapi through 4.5.5 allows attackers (with access to the admin panel) to discover sensitive user details by exploiting the query filter. The attacker can filter users by columns that contain sensitive information and infer a value from API responses. If the attacker has super admin access, then this can be exploited to discover the password hash and password reset token of all users. If the attacker has admin panel access to an account with permission to access the username and email of API users with a lower privileged role (e.g., Editor or Author), then this can be exploited to discover sensitive information for all API users but not other admin accounts.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://github.com/strapi/strapi/releases | Release Notes | |
cve@mitre.org | https://strapi.io/blog/security-disclosure-of-vulnerabilities-cve | Exploit, Vendor Advisory | |
cve@mitre.org | https://www.ghostccamm.com/blog/multi_strapi_vulns/ | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/strapi/strapi/releases | Release Notes | |
af854a3a-2127-422b-91ae-364da2661108 | https://strapi.io/blog/security-disclosure-of-vulnerabilities-cve | Exploit, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.ghostccamm.com/blog/multi_strapi_vulns/ | Exploit, Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:strapi:strapi:*:*:*:*:*:*:*:*", "matchCriteriaId": "3ECE8243-AB68-425A-9B1B-8294A028B2B9", "versionEndExcluding": "4.8.0", "versionStartIncluding": "3.2.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Strapi through 4.5.5 allows attackers (with access to the admin panel) to discover sensitive user details by exploiting the query filter. The attacker can filter users by columns that contain sensitive information and infer a value from API responses. If the attacker has super admin access, then this can be exploited to discover the password hash and password reset token of all users. If the attacker has admin panel access to an account with permission to access the username and email of API users with a lower privileged role (e.g., Editor or Author), then this can be exploited to discover sensitive information for all API users but not other admin accounts." } ], "id": "CVE-2023-22894", "lastModified": "2025-02-05T17:15:18.590", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 3.6, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2023-04-19T16:15:07.303", "references": [ { "source": "cve@mitre.org", "tags": [ "Release Notes" ], "url": "https://github.com/strapi/strapi/releases" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://strapi.io/blog/security-disclosure-of-vulnerabilities-cve" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.ghostccamm.com/blog/multi_strapi_vulns/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes" ], "url": "https://github.com/strapi/strapi/releases" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://strapi.io/blog/security-disclosure-of-vulnerabilities-cve" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.ghostccamm.com/blog/multi_strapi_vulns/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-312" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-312" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2020-02-04 20:15
Modified
2024-11-21 05:38
Severity ?
Summary
A denial of service exists in strapi v3.0.0-beta.18.3 and earlier that can be abused in the admin console using admin rights can lead to arbitrary restart of the application.
References
▼ | URL | Tags | |
---|---|---|---|
support@hackerone.com | https://hackerone.com/reports/768574 | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://hackerone.com/reports/768574 | Exploit, Third Party Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:strapi:strapi:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "1F93DAB9-86B0-40CE-88C4-672827F2D653", "versionEndExcluding": "3.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha10.1:*:*:*:node.js:*:*", "matchCriteriaId": "6EE852E3-ED80-456D-AF2D-63269A8B8754", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha10.2:*:*:*:node.js:*:*", "matchCriteriaId": "52194D3F-9994-4813-A075-580448159B87", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha10.3:*:*:*:node.js:*:*", "matchCriteriaId": "46B62038-4FC8-4BC7-B0BB-224A3C2B1354", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha11:*:*:*:node.js:*:*", "matchCriteriaId": "636300D1-13DB-41BB-B0B7-FB9AB28B419C", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha11.1:*:*:*:node.js:*:*", "matchCriteriaId": "5713BCDA-1670-4D63-8896-1122A2B44376", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha11.2:*:*:*:node.js:*:*", "matchCriteriaId": "3B219527-7B2A-402B-B43A-13EC2B38DF8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha11.3:*:*:*:node.js:*:*", "matchCriteriaId": "DB9E71EA-509F-4F45-9A06-BDD19DD8E3AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha12:*:*:*:node.js:*:*", "matchCriteriaId": "CEB20A91-A7DC-412C-BD3E-4E4A3DDFDA9B", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha12.1:*:*:*:node.js:*:*", "matchCriteriaId": "97B77C91-6F49-4DAD-A07B-C58154B10481", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha12.1.3:*:*:*:node.js:*:*", "matchCriteriaId": "220E4312-55CE-4C86-B99D-8913BB549130", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha12.2:*:*:*:node.js:*:*", "matchCriteriaId": "141D91D9-01B4-45C8-9BC5-E265BF16FBA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha12.3:*:*:*:node.js:*:*", "matchCriteriaId": "056967E8-55F5-49AB-BDB4-D1910EADF083", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha12.4:*:*:*:node.js:*:*", "matchCriteriaId": "877A24E1-B9FA-41DF-9742-A37B20884C53", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha12.5:*:*:*:node.js:*:*", "matchCriteriaId": "055293E3-CC94-4783-B988-E3A96588BA86", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha12.6:*:*:*:node.js:*:*", "matchCriteriaId": "B6EA5838-3722-4FDB-9212-C99BEB2001A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha12.7:*:*:*:node.js:*:*", "matchCriteriaId": "C392DBF7-1497-4C16-B722-F3F0FC8FB16D", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha12.7.1:*:*:*:node.js:*:*", "matchCriteriaId": "BF643EAD-83B8-43A4-8B5F-C14DE36C4F0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha13:*:*:*:node.js:*:*", "matchCriteriaId": "47709AB6-C345-47CD-8B49-520EBC18DF86", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha13.0.1:*:*:*:node.js:*:*", "matchCriteriaId": "B2B4E69E-1D02-4046-B733-3266F16C3533", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha13.1:*:*:*:node.js:*:*", "matchCriteriaId": "C7109F10-26A3-44E8-A210-00246FBDA354", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha14:*:*:*:node.js:*:*", "matchCriteriaId": "687D384F-481F-4784-BCB7-9355B417E11D", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha14.1:*:*:*:node.js:*:*", "matchCriteriaId": "23FFEFA7-BBEC-41F8-B002-D91517121B86", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha14.1.1:*:*:*:node.js:*:*", "matchCriteriaId": "73C0F58F-943C-40B4-A7ED-8A059F935ECF", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha14.2:*:*:*:node.js:*:*", "matchCriteriaId": "A0EE4A3E-AA4C-40A3-9E70-3F64195499A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha14.3:*:*:*:node.js:*:*", "matchCriteriaId": "3FBAEC7D-E572-468A-B044-B0A3F09AE5D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha14.4.0:*:*:*:node.js:*:*", "matchCriteriaId": "D9B013A5-736A-4C9C-84F1-DB2A2437C312", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha14.5:*:*:*:node.js:*:*", "matchCriteriaId": "3DAFF093-2506-4BEC-8CC7-7C1FAAB74C07", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha15:*:*:*:node.js:*:*", "matchCriteriaId": "6A7B2627-35C7-4F49-A64F-44360221AEBF", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha16:*:*:*:node.js:*:*", "matchCriteriaId": "53D5A194-24A5-4048-B75A-4EDEED6F0F1F", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha17:*:*:*:node.js:*:*", "matchCriteriaId": "22FFD289-7568-469A-8B63-52D75682429F", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha18:*:*:*:node.js:*:*", "matchCriteriaId": "7E4D80A2-27C1-4CAE-9AB4-38D0003451D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha19:*:*:*:node.js:*:*", "matchCriteriaId": "5C223C65-B9D2-4F4F-9979-BF1B9D9F5C69", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha20:*:*:*:node.js:*:*", "matchCriteriaId": "F0114DCB-8D6C-41F2-B83C-7CAC30E39B4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha21:*:*:*:node.js:*:*", "matchCriteriaId": "ECF56323-AE13-4E1F-A95A-51B30024FD63", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha22:*:*:*:node.js:*:*", "matchCriteriaId": "014C1011-56B2-4EF0-A13E-BBE33C3E986B", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha23:*:*:*:node.js:*:*", "matchCriteriaId": "5FF8D108-FF45-4698-BD18-DE62AE166D35", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha23.1:*:*:*:node.js:*:*", "matchCriteriaId": "D90F12B0-C768-4041-924A-74D22184B135", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha24:*:*:*:node.js:*:*", "matchCriteriaId": "0DB5369B-8F9B-4A48-8648-7DE9D0368FE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha24.1:*:*:*:node.js:*:*", "matchCriteriaId": "A6DCB0A7-EC8B-47E5-8285-4B0917EBF6F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha25:*:*:*:node.js:*:*", "matchCriteriaId": "0862892A-08CE-4E47-AC99-89546A183516", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha25.1:*:*:*:node.js:*:*", "matchCriteriaId": "4368EC48-1BB9-42F5-BFE7-6120400559FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha25.2:*:*:*:node.js:*:*", "matchCriteriaId": "15ADF3FB-048E-4D80-82C6-FDC0DE9AB020", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha26:*:*:*:node.js:*:*", "matchCriteriaId": "1D7D2FEF-F0A6-4E40-B6E4-B6CE5794734C", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha26.1:*:*:*:node.js:*:*", "matchCriteriaId": "6EEE30CD-7CA8-4731-8BDE-43BF38E10263", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha26.2:*:*:*:node.js:*:*", "matchCriteriaId": "EE170523-786E-4124-B419-40E6663B6B75", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha4:*:*:*:node.js:*:*", "matchCriteriaId": "CE7A2876-6BF5-41F5-91AF-B4BCEB83D5ED", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha4.8:*:*:*:node.js:*:*", "matchCriteriaId": "E247B538-E23D-4BA2-96F7-0A2457242570", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha5.3:*:*:*:node.js:*:*", "matchCriteriaId": "E90AB495-C345-485A-B760-85D12CF939D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha5.5:*:*:*:node.js:*:*", "matchCriteriaId": "6DEDCCC3-711B-417D-9B8D-E2C6699EB7D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha6.3:*:*:*:node.js:*:*", "matchCriteriaId": "52A4747F-A304-43A3-B9F3-F58163021A7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha6.4:*:*:*:node.js:*:*", "matchCriteriaId": "2D0C3905-B951-46CB-8345-7396479CA370", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha6.7:*:*:*:node.js:*:*", "matchCriteriaId": "259A9640-27B8-4C69-8F3B-F5A0E756E7B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha7.2:*:*:*:node.js:*:*", "matchCriteriaId": "87812E56-5089-4A37-AE95-8852B1E11CF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha7.3:*:*:*:node.js:*:*", "matchCriteriaId": "CD232170-E4C1-40EA-8F1D-51DEA718C7CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha8:*:*:*:node.js:*:*", "matchCriteriaId": "84DA64DC-32E8-4694-B357-CD3C1A06D730", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha8.3:*:*:*:node.js:*:*", "matchCriteriaId": "7C758690-3D96-46DF-91FA-4387F6F68C0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha9:*:*:*:node.js:*:*", "matchCriteriaId": "614335CB-D527-4117-B87E-D0B5632C0F1B", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha9.1:*:*:*:node.js:*:*", "matchCriteriaId": "F84F8BD7-E720-42E5-A544-1EC8E6B6ED9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:alpha9.2:*:*:*:node.js:*:*", "matchCriteriaId": "23FE6911-44E6-4F87-9288-ABD5BA63FB43", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:beta0:*:*:*:node.js:*:*", "matchCriteriaId": "84F5D639-E63B-4215-B547-084A087D0B5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:beta1:*:*:*:node.js:*:*", "matchCriteriaId": "1DDF3F85-932A-49FF-9B7C-13CC46A9C6A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:beta10:*:*:*:node.js:*:*", "matchCriteriaId": "EF272A2E-ABC1-46BF-B4AE-6C121FD28B45", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:beta11:*:*:*:node.js:*:*", "matchCriteriaId": "9BA52F67-08A1-455B-8E18-A28FD3866DD6", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:beta12:*:*:*:node.js:*:*", "matchCriteriaId": "7889A151-A720-47CF-9547-DE6F310F86C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:beta13:*:*:*:node.js:*:*", "matchCriteriaId": "7C7FB74A-4D7A-4D39-AA24-9BD0DAC65B57", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:beta14:*:*:*:node.js:*:*", "matchCriteriaId": "8A4FBB0A-EC18-4740-9D6D-7775BC1096DE", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:beta15:*:*:*:node.js:*:*", "matchCriteriaId": "3FE2224D-DAE2-468F-A439-9B1737C42508", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:beta16:*:*:*:node.js:*:*", "matchCriteriaId": "990EBBC0-7AD2-4FE0-BFA5-3167706E3665", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:beta16.1:*:*:*:node.js:*:*", "matchCriteriaId": "2544E58C-1795-4630-AFE5-B9315B809629", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:beta16.2:*:*:*:node.js:*:*", "matchCriteriaId": "2B277331-0255-4B17-9835-02CF2A5AEEA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:beta16.3:*:*:*:node.js:*:*", "matchCriteriaId": "BD3D2147-F5F5-44CA-B0CE-64192361CE44", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:beta16.4:*:*:*:node.js:*:*", "matchCriteriaId": "2B0A8BAB-62B1-4B5C-B251-1E8E801966F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:beta16.5:*:*:*:node.js:*:*", "matchCriteriaId": "70DF82AF-24A9-4653-B8E5-C10A8E16220A", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:beta16.6:*:*:*:node.js:*:*", "matchCriteriaId": "F2A26B8D-4B62-440C-87D6-1BA6E969FD25", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:beta16.7:*:*:*:node.js:*:*", "matchCriteriaId": "7B855E3A-53D8-4625-B5CA-D81825535FE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:beta16.8:*:*:*:node.js:*:*", "matchCriteriaId": "0CA4FFF0-186D-46D0-BC4D-1B76DC540CDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:beta17:*:*:*:node.js:*:*", "matchCriteriaId": "73AD45A2-08E2-4C26-AD49-1EDD02461E83", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:beta17.1:*:*:*:node.js:*:*", "matchCriteriaId": "79B53AC7-4498-4782-A548-6708DDCF4412", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:beta17.2:*:*:*:node.js:*:*", "matchCriteriaId": "B00A40E6-E0CA-4BCA-9413-4DF81E9B2460", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:beta17.3:*:*:*:node.js:*:*", "matchCriteriaId": "CE36857B-E5BC-4649-8EB0-371E24D98820", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:beta17.4:*:*:*:node.js:*:*", "matchCriteriaId": "7A8E39F9-D4A1-441D-B199-C96A7B3AFAB6", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:beta17.5:*:*:*:node.js:*:*", "matchCriteriaId": "60A5BEEA-B302-41E3-8830-8CAC6E4A5BDC", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:beta17.6:*:*:*:node.js:*:*", "matchCriteriaId": "08274A0A-1AAF-4530-85F9-A7C3C1D5AB8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:beta17.7:*:*:*:node.js:*:*", "matchCriteriaId": "C2AC24A7-85C4-4051-818B-981EEB27C857", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:beta17.8:*:*:*:node.js:*:*", "matchCriteriaId": "AD070CAC-D2BF-4A4F-AA22-E102D5D29617", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:beta18:*:*:*:node.js:*:*", "matchCriteriaId": "AA2A5AB0-6C85-4410-A324-D45A03754B92", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:beta18.1:*:*:*:node.js:*:*", "matchCriteriaId": "9BD23F83-75CD-43DB-9BC4-B000D1D1A49F", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:beta18.2:*:*:*:node.js:*:*", "matchCriteriaId": "2B7FB954-2B7D-421F-8B5E-A1D1994E7D7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:beta18.3:*:*:*:node.js:*:*", "matchCriteriaId": "CA1123EB-AA28-455F-B789-D62641173257", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:beta2:*:*:*:node.js:*:*", "matchCriteriaId": "B7F61FE0-BF4E-41CA-8DA8-7FAB39E5EDDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:beta3:*:*:*:node.js:*:*", "matchCriteriaId": "80AABA42-61B8-4D2E-9C46-025B38764B99", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:beta4:*:*:*:node.js:*:*", "matchCriteriaId": "BAEB954A-5D4E-4A86-BBD5-6AD9C9F2CFAB", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:beta5:*:*:*:node.js:*:*", "matchCriteriaId": "0D41E588-6C0A-4F6F-ADBF-C06AB9CB5475", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:beta6:*:*:*:node.js:*:*", "matchCriteriaId": "5ACFCD43-A822-4035-BC1C-20831DF03B94", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:beta7:*:*:*:node.js:*:*", "matchCriteriaId": "C5D0A9A1-FCD3-41A3-BD1B-7CB6AA922939", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:beta8:*:*:*:node.js:*:*", "matchCriteriaId": "49C15CB6-F0A3-46C9-9D49-53C734D47FA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:strapi:strapi:3.0.0:beta9:*:*:*:node.js:*:*", "matchCriteriaId": "18B032DD-34E7-45DF-8342-9C03EA349C24", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A denial of service exists in strapi v3.0.0-beta.18.3 and earlier that can be abused in the admin console using admin rights can lead to arbitrary restart of the application." }, { "lang": "es", "value": "Se presenta una denegaci\u00f3n de servicio en strapi versiones v3.0.0-beta.18.3 y anteriores, que puede ser abusada en la consola de administraci\u00f3n utilizando los derechos de administrador, lo que puede conllevar a un reinicio arbitrario de la aplicaci\u00f3n." } ], "id": "CVE-2020-8123", "lastModified": "2024-11-21T05:38:20.383", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-02-04T20:15:14.447", "references": [ { "source": "support@hackerone.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://hackerone.com/reports/768574" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://hackerone.com/reports/768574" } ], "sourceIdentifier": "support@hackerone.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-400" } ], "source": "support@hackerone.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-400" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-04-12 17:15
Modified
2024-11-21 06:55
Severity ?
Summary
An arbitrary file upload vulnerability in the file upload module of Strapi v4.1.5 allows attackers to execute arbitrary code via a crafted file.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://github.com/strapi/strapi | Third Party Advisory | |
cve@mitre.org | https://www.youtube.com/watch?v=LEeabouqRrg | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/strapi/strapi | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.youtube.com/watch?v=LEeabouqRrg | Exploit, Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:strapi:strapi:4.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "63E65EDA-5E77-4239-91E4-5838BD9D1D87", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An arbitrary file upload vulnerability in the file upload module of Strapi v4.1.5 allows attackers to execute arbitrary code via a crafted file." }, { "lang": "es", "value": "Una vulnerabilidad de carga de archivos arbitraria en el m\u00f3dulo de carga de archivos de Strapi versi\u00f3n v4.1.5, permite a atacantes ejecutar c\u00f3digo arbitrario por medio de un archivo dise\u00f1ado" } ], "id": "CVE-2022-27263", "lastModified": "2024-11-21T06:55:31.240", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-04-12T17:15:10.057", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/strapi/strapi" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.youtube.com/watch?v=LEeabouqRrg" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/strapi/strapi" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.youtube.com/watch?v=LEeabouqRrg" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-434" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-07-25 15:15
Modified
2024-11-21 08:06
Severity ?
4.8 (Medium) - CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:L/A:N
7.1 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N
7.1 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N
Summary
Strapi is an open-source headless content management system. Prior to version 4.10.8, anyone (Strapi developers, users, plugins) can make every attribute of a Content-Type public without knowing it. The vulnerability only affects the handling of content types by Strapi, not the actual content types themselves. Users can use plugins or modify their own content types without realizing that the `privateAttributes` getter is being removed, which can result in any attribute becoming public. This can lead to sensitive information being exposed or the entire system being taken control of by an attacker(having access to password hashes). Anyone can be impacted, depending on how people are using/extending content-types. If the users are mutating the content-type, they will not be affected. Version 4.10.8 contains a patch for this issue.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:strapi:strapi:*:*:*:*:*:*:*:*", "matchCriteriaId": "BA7C9D2E-E4B5-4BA7-9174-51A805D34E39", "versionEndExcluding": "4.10.8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Strapi is an open-source headless content management system. Prior to version 4.10.8, anyone (Strapi developers, users, plugins) can make every attribute of a Content-Type public without knowing it. The vulnerability only affects the handling of content types by Strapi, not the actual content types themselves. Users can use plugins or modify their own content types without realizing that the `privateAttributes` getter is being removed, which can result in any attribute becoming public. This can lead to sensitive information being exposed or the entire system being taken control of by an attacker(having access to password hashes). Anyone can be impacted, depending on how people are using/extending content-types. If the users are mutating the content-type, they will not be affected. Version 4.10.8 contains a patch for this issue." } ], "id": "CVE-2023-34093", "lastModified": "2024-11-21T08:06:31.707", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 0.5, "impactScore": 4.2, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 4.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-07-25T15:15:13.377", "references": [ { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/strapi/strapi/commit/2fa8f30371bfd1db44c15e5747860ee5789096de" }, { "source": "security-advisories@github.com", "tags": [ "Release Notes" ], "url": "https://github.com/strapi/strapi/releases/tag/v4.10.8" }, { "source": "security-advisories@github.com", "tags": [ "Exploit" ], "url": "https://github.com/strapi/strapi/security/advisories/GHSA-chmr-rg2f-9jmf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/strapi/strapi/commit/2fa8f30371bfd1db44c15e5747860ee5789096de" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes" ], "url": "https://github.com/strapi/strapi/releases/tag/v4.10.8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "https://github.com/strapi/strapi/security/advisories/GHSA-chmr-rg2f-9jmf" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "security-advisories@github.com", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-04-19 16:15
Modified
2025-02-05 17:15
Severity ?
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Summary
Strapi through 4.5.5 does not verify the access or ID tokens issued during the OAuth flow when the AWS Cognito login provider is used for authentication. A remote attacker could forge an ID token that is signed using the 'None' type algorithm to bypass authentication and impersonate any user that use AWS Cognito for authentication.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://github.com/strapi/strapi/releases | Release Notes | |
cve@mitre.org | https://strapi.io/blog/security-disclosure-of-vulnerabilities-cve | Exploit, Vendor Advisory | |
cve@mitre.org | https://www.ghostccamm.com/blog/multi_strapi_vulns/ | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/strapi/strapi/releases | Release Notes | |
af854a3a-2127-422b-91ae-364da2661108 | https://strapi.io/blog/security-disclosure-of-vulnerabilities-cve | Exploit, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.ghostccamm.com/blog/multi_strapi_vulns/ | Exploit, Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:strapi:strapi:*:*:*:*:*:*:*:*", "matchCriteriaId": "4259DF00-FFB5-417D-9B75-08BA63F9CB14", "versionEndExcluding": "4.6.0", "versionStartIncluding": "3.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Strapi through 4.5.5 does not verify the access or ID tokens issued during the OAuth flow when the AWS Cognito login provider is used for authentication. A remote attacker could forge an ID token that is signed using the \u0027None\u0027 type algorithm to bypass authentication and impersonate any user that use AWS Cognito for authentication." } ], "id": "CVE-2023-22893", "lastModified": "2025-02-05T17:15:18.133", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2023-04-19T16:15:07.253", "references": [ { "source": "cve@mitre.org", "tags": [ "Release Notes" ], "url": "https://github.com/strapi/strapi/releases" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://strapi.io/blog/security-disclosure-of-vulnerabilities-cve" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.ghostccamm.com/blog/multi_strapi_vulns/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes" ], "url": "https://github.com/strapi/strapi/releases" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://strapi.io/blog/security-disclosure-of-vulnerabilities-cve" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.ghostccamm.com/blog/multi_strapi_vulns/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
jvndb-2022-000033
Vulnerability from jvndb
Published
2022-05-13 16:45
Modified
2024-06-18 11:17
Severity ?
Summary
Strapi vulnerable to cross-site scripting
Details
Strapi contains a stored cross-site scripting vulnerability (CWE-79) in the file upload function.
Yuta Morioka of Information Science College reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
References
▼ | Type | URL |
---|---|---|
JVN | http://jvn.jp/en/jp/JVN44550983/index.html | |
CVE | https://www.cve.org/CVERecord?id=CVE-2022-29894 | |
NVD | https://nvd.nist.gov/vuln/detail/CVE-2022-29894 | |
Cross-site Scripting(CWE-79) | https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html |
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000033.html", "dc:date": "2024-06-18T11:17+09:00", "dcterms:issued": "2022-05-13T16:45+09:00", "dcterms:modified": "2024-06-18T11:17+09:00", "description": "Strapi contains a stored cross-site scripting vulnerability (CWE-79) in the file upload function.\r\n\r\nYuta Morioka of Information Science College reported this vulnerability to IPA.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.", "link": "https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000033.html", "sec:cpe": { "#text": "cpe:/a:strapi:strapi", "@product": "strapi", "@vendor": "strapi", "@version": "2.2" }, "sec:cvss": [ { "@score": "3.5", "@severity": "Low", "@type": "Base", "@vector": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "@version": "2.0" }, { "@score": "5.4", "@severity": "Medium", "@type": "Base", "@vector": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "@version": "3.0" } ], "sec:identifier": "JVNDB-2022-000033", "sec:references": [ { "#text": "http://jvn.jp/en/jp/JVN44550983/index.html", "@id": "JVN#44550983", "@source": "JVN" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2022-29894", "@id": "CVE-2022-29894", "@source": "CVE" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2022-29894", "@id": "CVE-2022-29894", "@source": "NVD" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-79", "@title": "Cross-site Scripting(CWE-79)" } ], "title": "Strapi vulnerable to cross-site scripting" }