Описание
Command Injection in strapi
Versions of strapi before 3.0.0-beta.17.8 are vulnerable to Command Injection. The package fails to sanitize plugin names in the /admin/plugins/install/ route. This may allow an authenticated attacker with admin privileges to run arbitrary commands in the server.
Recommendation
Upgrade to version 3.0.0-beta.17.8 or later
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2019-19609
- https://github.com/strapi/strapi/pull/4636
- https://bittherapy.net/post/strapi-framework-remote-code-execution
- https://www.npmjs.com/advisories/1424
- http://packetstormsecurity.com/files/163940/Strapi-3.0.0-beta.17.7-Remote-Code-Execution.html
- http://packetstormsecurity.com/files/163950/Strapi-CMS-3.0.0-beta.17.4-Remote-Code-Execution.html
Пакеты
Наименование
strapi
npm
Затронутые версииВерсия исправления
<= 3.0.0-beta.17.7
3.0.0-beta.17.8
Связанные уязвимости
CVSS3: 7.2
nvd
около 6 лет назад
The Strapi framework before 3.0.0-beta.17.8 is vulnerable to Remote Code Execution in the Install and Uninstall Plugin components of the Admin panel, because it does not sanitize the plugin name, and attackers can inject arbitrary shell commands to be executed by the execa function.