cve/2023/CVE-2023-22621.md

24 lines
1.1 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-22621](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22621)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
Strapi through 4.5.5 allows authenticated Server-Side Template Injection (SSTI) that can be exploited to execute arbitrary code on the server. A remote attacker with access to the Strapi admin panel can inject a crafted payload that executes code on the server into an email template that bypasses the validation checks that should prevent code execution.
### POC
#### Reference
- https://github.com/strapi/strapi/releases
- https://strapi.io/blog/security-disclosure-of-vulnerabilities-cve
- https://www.ghostccamm.com/blog/multi_strapi_vulns/
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/abrahim7112/Vulnerability-checking-program-for-Android
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/sofianeelhor/CVE-2023-22621-POC
- https://github.com/strapi/security-patches