Improper Removal of Sensitive Information Before Storage or Transfer in Strapi (GHSA-f6fm-r26q-p747)
- Severity:
- High
Description
An authenticated user with access to the Strapi admin panel can view private and sensitive data, such as email and password reset tokens, for other admin panel users that have a relationship (e.g., created by, updated by) with content accessible to the authenticated user.
Recommendation
Update the @strapi/strapi
package to the latest compatible version. Followings are version details:
- Affected version(s): <= 4.0.0-beta.14
- Patched version(s): 4.0.0-beta.15
References
Related Issues
- Strapi Server-Side Request Forgery (SSRF) - CVE-2024-37818
- Strapi leaking sensitive user information by filtering on private fields - CVE-2023-22894
- Unauthorized Access to Private Fields in User Registration API - CVE-2023-39345
- Parse Server vulnerable to remote code execution via MongoDB BSON parser through prototype pollution - CVE-2023-36475
- Tags:
- npm
- @strapi/strapi
Anything's wrong? Let us know Last updated on January 27, 2023