Page 6 of 28 results (0.003 seconds)

CVSS: 4.9EPSS: 0%CPEs: 98EXPL: 1

A denial of service exists in strapi v3.0.0-beta.18.3 and earlier that can be abused in the admin console using admin rights can lead to arbitrary restart of the application. Se presenta una denegación de servicio en strapi versiones v3.0.0-beta.18.3 y anteriores, que puede ser abusada en la consola de administración utilizando los derechos de administrador, lo que puede conllevar a un reinicio arbitrario de la aplicación. • https://hackerone.com/reports/768574 • CWE-400: Uncontrolled Resource Consumption •

CVSS: 9.0EPSS: 9%CPEs: 93EXPL: 11

The Strapi framework before 3.0.0-beta.17.8 is vulnerable to Remote Code Execution in the Install and Uninstall Plugin components of the Admin panel, because it does not sanitize the plugin name, and attackers can inject arbitrary shell commands to be executed by the execa function. El framework Strapi versiones anteriores a 3.0.0-beta.17.8, es vulnerable a una Ejecución de Código Remota en los componentes del Plugin de Instalación y Desinstalación del panel de Administración, ya que no sanea el nombre del plugin y los atacantes pueden inyectar comandos de shell arbitrarios para ser ejecutados mediante la función execa. • https://www.exploit-db.com/exploits/50238 https://github.com/diego-tella/CVE-2019-19609-EXPLOIT https://github.com/z9fr/CVE-2019-19609 https://github.com/guglia001/CVE-2019-19609 https://github.com/glowbase/CVE-2019-19609 https://github.com/D3m0nicw0lf/CVE-2019-19609 https://github.com/RamPanic/CVE-2019-19609-EXPLOIT https://github.com/n000xy/CVE-2019-19609-POC-Python http://packetstormsecurity.com/files/163940/Strapi-3.0.0-beta.17.7-Remote-Code-Execution.html http:/&#x • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 9.8EPSS: 87%CPEs: 90EXPL: 8

strapi before 3.0.0-beta.17.5 mishandles password resets within packages/strapi-admin/controllers/Auth.js and packages/strapi-plugin-users-permissions/controllers/Auth.js. strapi versiones anteriores a 3.0.0-beta.17.5, maneja inapropiadamente los restablecimientos de contraseña dentro de los archivos packages/strapi-admin/controllers/Auth.js y packages/strapi-plugin-users-permissions/controllers/Auth.js. • https://www.exploit-db.com/exploits/50237 https://www.exploit-db.com/exploits/50716 https://github.com/guglia001/CVE-2019-18818 https://github.com/rasyidfox/CVE-2019-18818 https://github.com/ossf-cve-benchmark/CVE-2019-18818 http://packetstormsecurity.com/files/163939/Strapi-3.0.0-beta-Authentication-Bypass.html http://packetstormsecurity.com/files/163950/Strapi-CMS-3.0.0-beta.17.4-Remote-Code-Execution.html http://packetstormsecurity.com/files/165896/Strapi-CMS-3.0.0-beta.17.4 • CWE-640: Weak Password Recovery Mechanism for Forgotten Password •