vendor:
Strapi CMS
by:
Musyoka Ian
7,2
CVSS
HIGH
Remote Code Execution (RCE)
78
CWE
Product Name: Strapi CMS
Affected Version From: 3.0.0-beta.17.4
Affected Version To: 3.0.0-beta.17.4
Patch Exists: YES
Related CWE: CVE-2019-18818, CVE-2019-19609
CPE: a:strapi:strapi_cms
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Ubuntu 20.04
2021
Strapi CMS 3.0.0-beta.17.4 – Remote Code Execution (RCE) (Unauthenticated)
This exploit allows an unauthenticated attacker to execute arbitrary code on the vulnerable Strapi CMS version 3.0.0-beta.17.4 or lower. The exploit works by resetting the password of the admin user and then using the JWT token to execute arbitrary code on the server. The exploit is tested on Ubuntu 20.04.
Mitigation:
Upgrade to the latest version of Strapi CMS and ensure that all security patches are applied.