Strapi is an open-source content management system. By combining two vulnerabilities (an `Open Redirect` and `session token sent as URL query parameter`) in @strapi/plugin-users-permissions before version 4.24.2, is its possible of an unauthenticated attacker to bypass authentication mechanisms and retrieve the 3rd party tokens. The attack requires user interaction (one click). Unauthenticated attackers can leverage two vulnerabilities to obtain an 3rd party token and the bypass authentication of Strapi apps. Users should upgrade @strapi/plugin-users-permissions to version 4.24.2 to receive a patch.
History

Thu, 26 Sep 2024 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Strapi
Strapi strapi
CPEs cpe:2.3:a:strapi:strapi:*:*:*:*:*:*:*:*
Vendors & Products Strapi
Strapi strapi

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2024-06-12T14:54:46.045Z

Updated: 2024-08-02T02:42:59.898Z

Reserved: 2024-04-30T06:56:33.381Z

Link: CVE-2024-34065

cve-icon Vulnrichment

Updated: 2024-08-02T02:42:59.898Z

cve-icon NVD

Status : Analyzed

Published: 2024-06-12T15:15:51.460

Modified: 2024-09-26T14:55:53.360

Link: CVE-2024-34065

cve-icon Redhat

No data.