vendor:
Strapi
by:
David Utón (M3n0sD0n4ld)
7,2
CVSS
HIGH
Remote Code Execution (RCE)
78
CWE
Product Name: Strapi
Affected Version From: strapi-3.0.0-beta.17.7 and earlier
Affected Version To: strapi-3.0.0-beta.17.7 and earlier
Patch Exists: YES
Related CWE: CVE-2019-19609
CPE: a:strapi:strapi:3.0.0-beta.17.7
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Linux Ubuntu 18.04.5 LTS
2021
Strapi 3.0.0-beta.17.7 – Remote Code Execution (RCE) (Authenticated)
Strapi 3.0.0-beta.17.7 is vulnerable to Remote Code Execution (RCE) when an authenticated user sends a malicious payload to the /admin/plugins/install endpoint. This payload is executed in the context of the web server user. An attacker can use this vulnerability to execute arbitrary code on the server.
Mitigation:
Update to the latest version of Strapi 3.0.0-beta.17.7 or later.