cve/2023/CVE-2023-22893.md

20 lines
925 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-22893](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22893)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
Strapi through 4.5.5 does not verify the access or ID tokens issued during the OAuth flow when the AWS Cognito login provider is used for authentication. A remote attacker could forge an ID token that is signed using the 'None' type algorithm to bypass authentication and impersonate any user that use AWS Cognito for authentication.
### POC
#### Reference
- https://github.com/strapi/strapi/releases
- https://strapi.io/blog/security-disclosure-of-vulnerabilities-cve
- https://www.ghostccamm.com/blog/multi_strapi_vulns/
#### Github
- https://github.com/ARPSyndicate/cvemon