Skip to main content

Authentication Bypass by Capture-replay

CVE-2024-34065

Severity High
Score 8.1/10

Summary

Strapi is an open-source content management system. By combining two vulnerabilities (an 'Open Redirect' and 'session token sent as URL query parameter') in @strapi/plugin-users-permissions versions through 4.24.1, and 5.0.0-alpha.0 through 5.0.0-beta.8 has a possibility of an unauthenticated attacker to bypass authentication mechanisms and retrieve the 3rd party tokens. The attack requires user interaction (one click). Unauthenticated attackers can leverage two vulnerabilities to obtain a 3rd party token and bypass the authentication of Strapi apps.

  • LOW
  • NETWORK
  • HIGH
  • UNCHANGED
  • REQUIRED
  • NONE
  • HIGH
  • NONE

CWE-294 - Authentication Bypass by Capture-replay

A capture-replay flaw exists when the design of the software makes it possible for a malicious user to sniff network traffic and bypass authentication by replaying it to the server in question to the same effect as the original message (or with minor changes).

Advisory Timeline

  • Published