Описание
Storing passwords in a recoverable format in the DOCUMENTATION plugin component of Strapi before 3.6.9 and 4.x before 4.1.5 allows an attacker to access a victim's HTTP request, get the victim's cookie, perform a base64 decode on the victim's cookie, and obtain a cleartext password, leading to getting API documentation for further API attacks.
Ссылки
- ExploitThird Party AdvisoryVDB Entry
- Issue TrackingPatchThird Party Advisory
- ProductThird Party Advisory
- Vendor Advisory
- ExploitThird Party AdvisoryVDB Entry
- Issue TrackingPatchThird Party Advisory
- ProductThird Party Advisory
- Vendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 3.6.9 (исключая)Версия от 4.0.0 (включая) до 4.1.5 (исключая)
Одно из
cpe:2.3:a:strapi:strapi:*:*:*:*:*:*:*:*
cpe:2.3:a:strapi:strapi:*:*:*:*:*:*:*:*
EPSS
Процентиль: 86%
0.03089
Низкий
7.5 High
CVSS3
5 Medium
CVSS2
Дефекты
CWE-522
Связанные уязвимости
CVSS3: 7.5
github
почти 4 года назад
Insecure password handling vulnerability in Strapi
EPSS
Процентиль: 86%
0.03089
Низкий
7.5 High
CVSS3
5 Medium
CVSS2
Дефекты
CWE-522