Information Exposure Affecting strapi package, versions <3.6.9


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of concept
EPSS
0.92% (84th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-JS-STRAPI-2807810
  • published4 May 2022
  • disclosed4 May 2022
  • creditKitchaphan Singchai

Introduced: 4 May 2022

CVE-2021-46440  (opens in a new tab)
CWE-200  (opens in a new tab)

How to fix?

Upgrade strapi to version 3.6.9 or higher.

Overview

strapi is a HTTP layer sits on top of Koa.

Affected versions of this package are vulnerable to Information Exposure due to the storage of passwords in a recoverable format in the documentation plugin component. Exploiting this vulnerability allows an attacker to access a victim's HTTP request, get the victim's cookie, perform a base64 decode on the victim's cookie, and obtain a cleartext password, leading to getting API documentation for further API attacks.

CVSS Scores

version 3.1