Strapi plugins vulnerable to Server-Side Template Injection and Remote Code Execution in the Users-Permissions Plugin (GHSA-2h87-4q2w-v4hf)
- Severity:
- High
Description
Strapi through 4.5.5 allows authenticated Server-Side Template Injection (SSTI) that can be exploited to execute arbitrary code on the server.
Recommendation
Update the @strapi/plugin-email
package to the latest compatible version. Followings are version details:
- Affected version(s): < 4.5.6
- Patched version(s): 4.5.6
References
- GHSA-2h87-4q2w-v4hf
- strapi.io
- www.ghostccamm.com
- CVE-2023-22621
- CWE-74
- CAPEC-310
- OWASP 2021-A3
- OWASP 2021-A6
Related Issues
- Server secret was included in static assets and served to clients - Vulnerability
- Redwood is vulnerable to account takeover via dbAuth "forgot-password - Vulnerability
- Parse Server before v3.4.1 vulnerable to Denial of Service - CVE-2019-1020012
- Incorrect default cookie name and recommendation - Vulnerability
- Tags:
- npm
- @strapi/plugin-email
Anything's wrong? Let us know Last updated on November 07, 2023