@strapi/strapi/.../strapi@4.0.0-next.1 vulnerabilities

An open source headless CMS solution to create and manage your own API. It provides a powerful dashboard and features to make your life easier. Databases supported: MySQL, MariaDB, PostgreSQL, SQLite

  • latest version

    5.5.1

  • latest non vulnerable version

  • first published

    3 years ago

  • latest version published

    6 hours ago

  • licenses detected

  • Direct Vulnerabilities

    Known vulnerabilities in the @strapi/strapi package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • M
    Information Exposure

    @strapi/strapi is an updated version of the old 'strapi', which is a free and open-source headless CMS delivering your content anywhere you need.

    Affected versions of this package are vulnerable to Information Exposure by developers, users, or plugins, all of who can make every attribute of a Content-Type public without knowing it. The privateAttributes getter is removed when content types are modified, which can result in any attribute becoming public.

    NOTE: If a user mutates the content-type they will not be affected.

    How to fix Information Exposure?

    Upgrade @strapi/strapi to version 4.10.8 or higher.

    <4.10.8
    • H
    Access Restriction Bypass

    @strapi/strapi is an updated version of the old 'strapi', which is a free and open-source headless CMS delivering your content anywhere you need.

    Affected versions of this package are vulnerable to Access Restriction Bypass due to missing verification of the access or ID tokens issued during the OAuth flow when the AWS Cognito login provider is used for authentication. A remote attacker could forge an ID token that is signed using the 'None' type algorithm to bypass authentication and impersonate any user that use AWS Cognito for authentication.

    How to fix Access Restriction Bypass?

    Upgrade @strapi/strapi to version 4.5.6 or higher.

    >=4.0.0-next.0 <4.5.6
    • H
    Information Exposure

    @strapi/strapi is an updated version of the old 'strapi', which is a free and open-source headless CMS delivering your content anywhere you need.

    Affected versions of this package are vulnerable to Information Exposure by revealing sensitive user information (including on Super Administrators) by filtering on private fields (including password reset tokens). This can allow an attacker to hijack a privileged account.

    How to fix Information Exposure?

    Upgrade @strapi/strapi to version 4.8.0 or higher.

    >=4.0.0-next.0 <4.8.0
    • M
    Improper Input Validation

    @strapi/strapi is an updated version of the old 'strapi', which is a free and open-source headless CMS delivering your content anywhere you need.

    Affected versions of this package are vulnerable to Improper Input Validation due to mishandling hidden attributes within admin API responses. Exploiting this vulnerability allows users with permission to read user data in the settings section to read all users' data, including password hashes, by manipulating columns when using the filter function.

    How to fix Improper Input Validation?

    Upgrade @strapi/strapi to version 4.1.10 or higher.

    >=4.0.0-next.0 <4.1.10
    • L
    Cross-site Scripting (XSS)

    @strapi/strapi is an updated version of the old 'strapi', which is a free and open-source headless CMS delivering your content anywhere you need.

    Affected versions of this package are vulnerable to Cross-site Scripting (XSS) due to insufficient sanitization of user-supplied data in the file upload function. This vulnerability is exploitable when the victim has administrative privileges.

    Note: Users of strapi should upgrade to @strapi/strapi, as strapi is EOL.

    How to fix Cross-site Scripting (XSS)?

    Upgrade @strapi/strapi to version 4.0.0 or higher.

    >=4.0.0-next.0 <4.0.0