Описание
Strapi allows unauthenticated attacker to reset admin password without valid reset token
Versions of strapi prior to 3.0.0-beta.17.5 are vulnerable to Privilege Escalation. The password reset routes allows an unauthenticated attacker to reset an admin's password without providing a valid password reset token.
Recommendation
Upgrade to version 3.0.0-beta.17.5 or later.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2019-18818
- https://github.com/strapi/strapi/pull/4443
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18818
- https://github.com/strapi/strapi/releases/tag/v3.0.0-beta.17.5
- https://www.npmjs.com/advisories/1311
- http://packetstormsecurity.com/files/163939/Strapi-3.0.0-beta-Authentication-Bypass.html
- http://packetstormsecurity.com/files/163950/Strapi-CMS-3.0.0-beta.17.4-Remote-Code-Execution.html
- http://packetstormsecurity.com/files/165896/Strapi-CMS-3.0.0-beta.17.4-Privilege-Escalation.html
Пакеты
Наименование
strapi
npm
Затронутые версииВерсия исправления
<= 3.0.0-beta.17.4
3.0.0-beta.17.5
Связанные уязвимости
CVSS3: 9.8
nvd
около 6 лет назад
strapi before 3.0.0-beta.17.5 mishandles password resets within packages/strapi-admin/controllers/Auth.js and packages/strapi-plugin-users-permissions/controllers/Auth.js.