Authentication Bypass Vulnerability in Strapi's OAuth Flow via AWS Cognito
CVE-2023-22893
7.5HIGH
What is CVE-2023-22893?
Strapi versions up to 4.5.5 contain a vulnerability that allows remote attackers to bypass authentication mechanisms when using AWS Cognito as a login provider. This occurs due to insufficient verification of access or ID tokens generated during the OAuth process. By forging an ID token that utilizes the 'None' type algorithm, an attacker can impersonate any user authenticated through AWS Cognito, creating potential risks for data integrity and user security. It is crucial to update to a patched version to mitigate this risk.
References
EPSS Score
76% chance of being exploited in the next 30 days.
CVSS V3.1
Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
