Authentication Bypass in Strapi by Open Redirect and Token Exposure
CVE-2024-34065

8.1HIGH

Key Information:

Vendor

Strapi

Status
Vendor
CVE Published:
12 June 2024

What is CVE-2024-34065?

Strapi is an open-source content management system designed for building powerful APIs. A newly identified security vulnerability arises in the @strapi/plugin-users-permissions prior to version 4.24.2, which combines an Open Redirect flaw with a critical issue of session token exposure through URL query parameters. This vulnerability allows unauthenticated attackers, given the right conditions of user interaction, to bypass authentication mechanisms in Strapi applications. Once executed, attackers can retrieve third-party tokens, potentially compromising the integrity and security of the applications. It is recommended that users upgrade to @strapi/plugin-users-permissions version 4.24.2 to mitigate the risks associated with this security issue.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

References

CVSS V3.1

Score:
8.1
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

.