Page 4 of 28 results (0.010 seconds)

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

An authenticated user with access to the Strapi admin panel can view private and sensitive data, such as email and password reset tokens, for API users if content types accessible to the authenticated user contain relationships to API users (from:users-permissions). There are many scenarios in which such details from API users can leak in the JSON response within the admin panel, either through a direct or indirect relationship. Access to this information enables a user to compromise these users’ accounts if the password reset API endpoints have been enabled. In a worst-case scenario, a low-privileged user could get access to a high-privileged API account, and could read and modify any data as well as block access to both the admin panel and API by revoking privileges for all other users. Un usuario autenticado con acceso al panel de administración de Strapi puede visualizar datos privados y confidenciales, como el correo electrónico y los tokens de restablecimiento de contraseña, para los usuarios de la API si los tipos de contenido accesibles para el usuario autenticado contienen relaciones con los usuarios de la API (from:users-permissions). • https://www.synopsys.com/blogs/software-security/cyrc-advisory-strapi • CWE-212: Improper Removal of Sensitive Information Before Storage or Transfer •

CVSS: 9.0EPSS: 0%CPEs: 15EXPL: 0

An authenticated user with access to the Strapi admin panel can view private and sensitive data, such as email and password reset tokens, for other admin panel users that have a relationship (e.g., created by, updated by) with content accessible to the authenticated user. For example, a low-privileged “author” role account can view these details in the JSON response for an “editor” or “super admin” that has updated one of the author’s blog posts. There are also many other scenarios where such details from other users can leak in the JSON response, either through a direct or indirect relationship. Access to this information enables a user to compromise other users’ accounts by successfully invoking the password reset workflow. In a worst-case scenario, a low-privileged user could get access to a “super admin” account with full control over the Strapi instance, and could read and modify any data as well as block access to both the admin panel and API by revoking privileges for all other users. • https://www.synopsys.com/blogs/software-security/cyrc-advisory-strapi • CWE-212: Improper Removal of Sensitive Information Before Storage or Transfer •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 1

Storing passwords in a recoverable format in the DOCUMENTATION plugin component of Strapi before 3.6.9 and 4.x before 4.1.5 allows an attacker to access a victim's HTTP request, get the victim's cookie, perform a base64 decode on the victim's cookie, and obtain a cleartext password, leading to getting API documentation for further API attacks. El almacenamiento de contraseñas en un formato recuperable en el componente del plugin DOCUMENTATION de Strapi versiones anteriores a 3.6.9 y versiones 4.x anteriores a 4.1.5 permite a un atacante acceder a la petición HTTP de una víctima, obtener la cookie de la víctima, llevar a cabo una decodificación base64 en la cookie de la víctima y obtener una contraseña en texto sin cifrar, conllevando a una obtención de la documentación de la API para posteriores ataques a la misma Strap versions prior to 3.6.9 and 4.1.5 disclose a user's password due to simply base64 encoding it and sticking it in a cookie. • http://packetstormsecurity.com/files/166915/Strapi-3.6.8-Password-Disclosure-Insecure-Handling.html https://github.com/strapi/strapi/pull/12246 https://hub.docker.com/r/strapi/strapi https://strapi.io • CWE-522: Insufficiently Protected Credentials •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 1

An arbitrary file upload vulnerability in the file upload module of Strapi v4.1.5 allows attackers to execute arbitrary code via a crafted file. Una vulnerabilidad de carga de archivos arbitraria en el módulo de carga de archivos de Strapi versión v4.1.5, permite a atacantes ejecutar código arbitrario por medio de un archivo diseñado • https://github.com/strapi/strapi https://www.youtube.com/watch?v=LEeabouqRrg • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 1

Arbitrary Command Injection in GitHub repository strapi/strapi prior to 4.1.0. Una Inyección Arbitraria de Comandos en el repositorio de GitHub strapi/strapi versiones anteriores a 4.1.0. • https://github.com/strapi/strapi/commit/2a3f5e988be6a2c7dae5ac22b9e86d579b462f4c https://github.com/strapi/strapi/issues/12879 https://huntr.dev/bounties/001d1c29-805a-4035-93bb-71a0e81da3e5 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •