Arbitrary Code Injection Affecting strapi package, versions <3.0.0-beta.17.8


0.0
high

Snyk CVSS

    Attack Complexity Low
    Privileges Required High
    Confidentiality High
    Integrity High
    Availability High

    Threat Intelligence

    Exploit Maturity Mature
    EPSS 9.34% (95th percentile)
Expand this section
NVD
7.2 high

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-JS-STRAPI-536641
  • published 4 Dec 2019
  • disclosed 3 Dec 2019
  • credit AP

How to fix?

Upgrade strapi to version 3.0.0-beta.17.8 or higher.

Overview

strapi is a HTTP layer sits on top of Koa.

Affected versions of this package are vulnerable to Arbitrary Code Injection. The package fails to sanitize plugin names in the /admin/plugins/install/ route. This may allow an authenticated attacker with admin privileges to run arbitrary commands in the server.