Authentication Bypass Vulnerability in Strapi's OAuth Flow via AWS Cognito
CVE-2023-22893

7.5HIGH

Key Information:

Vendor

Strapi

Status
Vendor
CVE Published:
19 April 2023

What is CVE-2023-22893?

Strapi versions up to 4.5.5 contain a vulnerability that allows remote attackers to bypass authentication mechanisms when using AWS Cognito as a login provider. This occurs due to insufficient verification of access or ID tokens generated during the OAuth process. By forging an ID token that utilizes the 'None' type algorithm, an attacker can impersonate any user authenticated through AWS Cognito, creating potential risks for data integrity and user security. It is crucial to update to a patched version to mitigate this risk.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

References

EPSS Score

66% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.