Vulnerabilities/

Insecure password handling vulnerability in Strapi

Severity:
High

Description

Storing passwords in a recoverable format in the DOCUMENTATION plugin component of Strapi before 3.6.9 and 4.x before 4.1.5 allows an attacker to access a victim’s HTTP request. From this, the attacker can get the victim’s cookie, base64 decode it, and obtain a cleartext password, leading to getting API documentation for further API attacks.

Recommendation

Update the @strapi/strapi package to the latest compatible version. Followings are version details:

References

Related Issues

Tags:
npm
@strapi/strapi
Anything's wrong? Let us know Last updated on February 01, 2023

This issue is available in SmartScanner Professional

See Pricing