5.29.0
4 years ago
3 days ago
Known vulnerabilities in the @strapi/plugin-users-permissions package. This does not include vulnerabilities belonging to this package’s dependencies.
Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.
Fix for free| Vulnerability | Vulnerable Version |
|---|---|
@strapi/plugin-users-permissions is a headless CMS Affected versions of this package are vulnerable to Open Redirect when user-controllable data is incorporated into the target of a redirection in an unsafe way. In this specific context, this vulnerability allows the SSO token to be stolen, allowing an attacker to authenticate himself within the application. Notes: If parameter $_GET["callback"] is defined in the GET request, the assignment does not evaluate all conditions, but stops at the beginning. The value is then stored in the cookie koa.sess:
Which once base64 decoded become The signature of the cookie is stored in cookie How to fix Open Redirect? Upgrade | <4.24.2 |
@strapi/plugin-users-permissions is a headless CMS Affected versions of this package are vulnerable to Denial of Service (DoS) such that an attacker can circumvent the rate limit on the login function of Strapi's admin screen. How to fix Denial of Service (DoS)? Upgrade | <4.12.1 |