Server-Side Request Forgery (SSRF) Affecting strapi package, versions *
Threat Intelligence
Exploit Maturity
Proof of concept
EPSS
0.04% (10th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-JS-STRAPI-7323680
- published 21 Jun 2024
- disclosed 20 Jun 2024
- credit Vaibhav Barkade
Introduced: 20 Jun 2024
CVE-2024-37818 Open this link in a new tabHow to fix?
There is no fixed version for strapi
.
Overview
strapi is a HTTP layer sits on top of Koa.
Affected versions of this package are vulnerable to Server-Side Request Forgery (SSRF) through the /strapi.io/_next/image
component. This attack can be perform as an unauthorized user by simply sending GET request to the below endpoint, leading to sensitive data leakage, such as authorization credentials.
Workaround
Some means of remediation include:
Whitelists and DNS Resolution
Authentication on Internal Services
Harden Cloud Services
Response Handling
Disable Unused URL Schemas