Strapi is an open-source content management system. By combining two vulnerabilities (an `Open Redirect` and `session token sent as URL query parameter`) in @strapi/plugin-users-permissions before version 4.24.2, is its possible of an unauthenticated attacker to bypass authentication mechanisms and retrieve the 3rd party tokens. The attack requires user interaction (one click). Unauthenticated attackers can leverage two vulnerabilities to obtain an 3rd party token and the bypass authentication of Strapi apps. Users should upgrade @strapi/plugin-users-permissions to version 4.24.2 to receive a patch.
Metrics
Affected Vendors & Products
References
History
Thu, 26 Sep 2024 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Strapi
Strapi strapi |
|
CPEs | cpe:2.3:a:strapi:strapi:*:*:*:*:*:*:*:* | |
Vendors & Products |
Strapi
Strapi strapi |
MITRE
Status: PUBLISHED
Assigner: GitHub_M
Published: 2024-06-12T14:54:46.045Z
Updated: 2024-08-02T02:42:59.898Z
Reserved: 2024-04-30T06:56:33.381Z
Link: CVE-2024-34065
Vulnrichment
Updated: 2024-08-02T02:42:59.898Z
NVD
Status : Modified
Published: 2024-06-12T15:15:51.460
Modified: 2024-11-21T09:18:00.980
Link: CVE-2024-34065
Redhat
No data.