Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-9p2w-rmx4-9mw7

Опубликовано: 04 сент. 2020
Источник: github
Github: Прошло ревью
CVSS3: 7.2

Описание

Command Injection in strapi

Versions of strapi before 3.0.0-beta.17.8 are vulnerable to Command Injection. The package fails to sanitize plugin names in the /admin/plugins/install/ route. This may allow an authenticated attacker with admin privileges to run arbitrary commands in the server.

Recommendation

Upgrade to version 3.0.0-beta.17.8 or later

Пакеты

Наименование

strapi

npm
Затронутые версииВерсия исправления

<= 3.0.0-beta.17.7

3.0.0-beta.17.8

EPSS

Процентиль: 99%
0.816
Высокий

7.2 High

CVSS3

Дефекты

CWE-77

Связанные уязвимости

CVSS3: 7.2
nvd
около 6 лет назад

The Strapi framework before 3.0.0-beta.17.8 is vulnerable to Remote Code Execution in the Install and Uninstall Plugin components of the Admin panel, because it does not sanitize the plugin name, and attackers can inject arbitrary shell commands to be executed by the execa function.

EPSS

Процентиль: 99%
0.816
Высокий

7.2 High

CVSS3

Дефекты

CWE-77