Lucene search

K
cvelistGitHub_MCVELIST:CVE-2023-34235
HistoryJul 25, 2023 - 5:24 p.m.

CVE-2023-34235 Leaking sensitive user information still possible by filtering on private with prefix fields

2023-07-2517:24:19
CWE-200
GitHub_M
www.cve.org
strapi
version 4.10.8
sensitivity breach
user information
filtering attacks
prefix fields
knex query
data protection

8.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N

8.7 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

40.7%

Strapi is an open-source headless content management system. Prior to version 4.10.8, it is possible to leak private fields if one is using the t(number) prefix. Knex query allows users to change the default prefix. For example, if someone changes the prefix to be the same as it was before or to another table they want to query, the query changes from password to t1.password. password is protected by filtering protections but t1.password is not protected. This can lead to filtering attacks on everything related to the object again, including admin passwords and reset-tokens. Version 4.10.8 fixes this issue.

CNA Affected

[
  {
    "vendor": "strapi",
    "product": "strapi",
    "versions": [
      {
        "version": "< 4.10.8",
        "status": "affected"
      }
    ]
  }
]

8.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N

8.7 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

40.7%

Related for CVELIST:CVE-2023-34235