Strapi leaking sensitive user information by filtering on private fields
- Severity:
- High
Description
Strapi through 4.7.1 allows unauthenticated attackers to discover sensitive user details for Strapi administrators and API users.
Recommendation
Update the @strapi/strapi package to the latest compatible version. Followings are version details:
- Affected version(s): >= 3.2.1, < 4.8.0
- Patched version(s): 4.8.0
References
- GHSA-jjqf-j4w7-92w8
- strapi.io
- www.ghostccamm.com
- CVE-2023-22894
- CWE-312
- CAPEC-310
- OWASP 2021-A4
- OWASP 2021-A6
Related Issues
- Leaking sensitive user information still possible by filtering on private with prefix fields (GHSA-9xg4-3qfm-9w8f) - CVE-2023-34235
- Leaking sensitive user information still possible by filtering on private with prefix fields - CVE-2023-34235
- Strapi may leak sensitive user information, user reset password, tokens via content-manager views (GHSA-v8gg-4mq2-88q4) - CVE-2023-36472
- Unauthorized Access to Private Fields in User Registration API - CVE-2023-39345
- Tags:
- npm
- @strapi/strapi
Anything's wrong? Let us know Last updated on November 07, 2023