CVE-2023-37263 – Strapi's field level permissions not being respected in relationship title
https://notcve.org/view.php?id=CVE-2023-37263
Strapi is the an open-source headless content management system. Prior to version 4.12.1, field level permissions are not respected in the relationship title. If an actor has relationship title and the relationship shows a field they don't have permission to see, the field will still be visible. Version 4.12.1 has a fix for this issue. Strapi es un sistema de gestión de contenidos headless de código abierto. • https://github.com/strapi/strapi/releases/tag/v4.12.1 https://github.com/strapi/strapi/security/advisories/GHSA-m284-85mf-cgrc • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-400: Uncontrolled Resource Consumption •
CVE-2023-36472 – Strapi may leak sensitive user information, user reset password, tokens via content-manager views
https://notcve.org/view.php?id=CVE-2023-36472
Strapi is an open-source headless content management system. Prior to version 4.11.7, an unauthorized actor can get access to user reset password tokens if they have the configure view permissions. The `/content-manager/relations` route does not remove private fields or ensure that they can't be selected. This issue is fixed in version 4.11.7. Strapi es un sistema de gestión de contenidos headless de código abierto. • https://github.com/strapi/strapi/releases/tag/v4.11.7 https://github.com/strapi/strapi/security/advisories/GHSA-v8gg-4mq2-88q4 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2023-34235 – Leaking sensitive user information still possible by filtering on private with prefix fields
https://notcve.org/view.php?id=CVE-2023-34235
Strapi is an open-source headless content management system. Prior to version 4.10.8, it is possible to leak private fields if one is using the `t(number)` prefix. Knex query allows users to change the default prefix. For example, if someone changes the prefix to be the same as it was before or to another table they want to query, the query changes from `password` to `t1.password`. `password` is protected by filtering protections but `t1.password` is not protected. • https://github.com/strapi/strapi/releases/tag/v4.10.8 https://github.com/strapi/strapi/security/advisories/GHSA-9xg4-3qfm-9w8f • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2023-34093 – Strapi allows actors to make all attributes on a content-type public without noticing it
https://notcve.org/view.php?id=CVE-2023-34093
Strapi is an open-source headless content management system. Prior to version 4.10.8, anyone (Strapi developers, users, plugins) can make every attribute of a Content-Type public without knowing it. The vulnerability only affects the handling of content types by Strapi, not the actual content types themselves. Users can use plugins or modify their own content types without realizing that the `privateAttributes` getter is being removed, which can result in any attribute becoming public. This can lead to sensitive information being exposed or the entire system being taken control of by an attacker(having access to password hashes). • https://github.com/strapi/strapi/commit/2fa8f30371bfd1db44c15e5747860ee5789096de https://github.com/strapi/strapi/releases/tag/v4.10.8 https://github.com/strapi/strapi/security/advisories/GHSA-chmr-rg2f-9jmf • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2023-22621
https://notcve.org/view.php?id=CVE-2023-22621
Strapi through 4.5.5 allows authenticated Server-Side Template Injection (SSTI) that can be exploited to execute arbitrary code on the server. A remote attacker with access to the Strapi admin panel can inject a crafted payload that executes code on the server into an email template that bypasses the validation checks that should prevent code execution. • https://github.com/sofianeelhor/CVE-2023-22621-POC https://github.com/strapi/strapi/releases https://strapi.io/blog/security-disclosure-of-vulnerabilities-cve https://www.ghostccamm.com/blog/multi_strapi_vulns • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') •