CVE-2023-39345
Unauthorized Access to Private Fields in User Registration API in strapi
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
strapi is an open-source headless CMS. Versions prior to 4.13.1 did not properly restrict write access to fielded marked as private in the user registration endpoint. As such malicious users may be able to errantly modify their user records. This issue has been addressed in version 4.13.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Strapi es un CMS sin cabeza de código abierto. Las versiones anteriores a la 4.13.1 no restringían adecuadamente el acceso de escritura a los campos marcados como privados en el endpoint de registro de usuario. Como tal, los usuarios malintencionados pueden modificar erróneamente sus registros de usuario. Este problema se solucionó en la versión 4.13.1. Se recomienda a los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad.
CVSS Scores
SSVC
- Decision:Track*
Timeline
- 2023-07-28 CVE Reserved
- 2023-11-06 CVE Published
- 2024-09-04 CVE Updated
- 2024-09-04 First Exploit
- 2024-11-12 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-287: Improper Authentication
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|---|---|
https://github.com/strapi/strapi/security/advisories/GHSA-gc7p-j5xm-xxh2 | 2024-09-04 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Strapi Search vendor "Strapi" | Strapi Search vendor "Strapi" for product "Strapi" | >= 4.0.0 < 4.13.1 Search vendor "Strapi" for product "Strapi" and version " >= 4.0.0 < 4.13.1" | - |
Affected
|