Описание
Duplicate Advisory: OS Command Injection in Strapi
Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-9p2w-rmx4-9mw7. This link is maintained to preserve external references.
Original Description
The Strapi framework before 3.0.0-beta.17.8 is vulnerable to Remote Code Execution in the Install and Uninstall Plugin components of the Admin panel, because it does not sanitize the plugin name, and attackers can inject arbitrary shell commands to be executed by the execa function.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2019-19609
- https://github.com/strapi/strapi/pull/4636
- https://bittherapy.net/post/strapi-framework-remote-code-execution
- http://packetstormsecurity.com/files/163940/Strapi-3.0.0-beta.17.7-Remote-Code-Execution.html
- http://packetstormsecurity.com/files/163950/Strapi-CMS-3.0.0-beta.17.4-Remote-Code-Execution.html
Пакеты
Наименование
strapi
npm
Затронутые версииВерсия исправления
<= 3.0.0-beta.17.7
3.0.0-beta.17.8
7.2 High
CVSS3
Дефекты
CWE-20
CWE-78
7.2 High
CVSS3
Дефекты
CWE-20
CWE-78