CVE-2023-36472
Strapi may leak sensitive user information, user reset password, tokens via content-manager views
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
Strapi is an open-source headless content management system. Prior to version 4.11.7, an unauthorized actor can get access to user reset password tokens if they have the configure view permissions. The `/content-manager/relations` route does not remove private fields or ensure that they can't be selected. This issue is fixed in version 4.11.7.
Strapi es un sistema de gestión de contenidos headless de código abierto. Antes de la versión 4.11.7, un actor no autorizado puede obtener acceso a los tokens de restablecimiento de contraseña del usuario si tiene permisos de visualización de la configuración. La ruta `/content-manager/relations` no elimina campos privados ni garantiza que no se puedan seleccionar. Este problema se solucionó en la versión 4.11.7.
CVSS Scores
SSVC
- Decision:Track*
Timeline
- 2023-06-21 CVE Reserved
- 2023-09-15 CVE Published
- 2024-09-21 EPSS Updated
- 2024-09-25 CVE Updated
- 2024-09-25 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CAPEC
References (2)
URL | Tag | Source |
---|---|---|
https://github.com/strapi/strapi/releases/tag/v4.11.7 | Release Notes |
URL | Date | SRC |
---|---|---|
https://github.com/strapi/strapi/security/advisories/GHSA-v8gg-4mq2-88q4 | 2024-09-25 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|