Описание
Strapi through 4.5.5 allows authenticated Server-Side Template Injection (SSTI) that can be exploited to execute arbitrary code on the server. A remote attacker with access to the Strapi admin panel can inject a crafted payload that executes code on the server into an email template that bypasses the validation checks that should prevent code execution.
Ссылки
- Release Notes
- Vendor Advisory
- ExploitThird Party Advisory
- Release Notes
- Vendor Advisory
- ExploitThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия от 3.0.0 (включая) до 4.5.6 (исключая)
cpe:2.3:a:strapi:strapi:*:*:*:*:*:*:*:*
EPSS
Процентиль: 99%
0.8693
Высокий
7.2 High
CVSS3
10 Critical
CVSS3
Дефекты
CWE-74
CWE-74
Связанные уязвимости
CVSS3: 10
github
почти 3 года назад
Strapi plugins vulnerable to Server-Side Template Injection and Remote Code Execution in the Users-Permissions Plugin
EPSS
Процентиль: 99%
0.8693
Высокий
7.2 High
CVSS3
10 Critical
CVSS3
Дефекты
CWE-74
CWE-74