Authentication Bypass by Capture-replay
CVE-2024-34065
Summary
Strapi is an open-source content management system. By combining two vulnerabilities (an 'Open Redirect' and 'session token sent as URL query parameter') in @strapi/plugin-users-permissions versions through 4.24.1, and 5.0.0-alpha.0 through 5.0.0-beta.8 has a possibility of an unauthenticated attacker to bypass authentication mechanisms and retrieve the 3rd party tokens. The attack requires user interaction (one click). Unauthenticated attackers can leverage two vulnerabilities to obtain a 3rd party token and bypass the authentication of Strapi apps.
- LOW
- NETWORK
- HIGH
- UNCHANGED
- REQUIRED
- NONE
- HIGH
- NONE
CWE-294 - Authentication Bypass by Capture-replay
A capture-replay flaw exists when the design of the software makes it possible for a malicious user to sniff network traffic and bypass authentication by replaying it to the server in question to the same effect as the original message (or with minor changes).
References
Advisory Timeline
- Published