cve/2023/CVE-2023-36472.md
2024-06-18 02:51:15 +02:00

18 lines
943 B
Markdown

### [CVE-2023-36472](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36472)
![](https://img.shields.io/static/v1?label=Product&message=strapi&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%204.11.7%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor&color=brighgreen)
### Description
Strapi is an open-source headless content management system. Prior to version 4.11.7, an unauthorized actor can get access to user reset password tokens if they have the configure view permissions. The `/content-manager/relations` route does not remove private fields or ensure that they can't be selected. This issue is fixed in version 4.11.7.
### POC
#### Reference
- https://github.com/strapi/strapi/security/advisories/GHSA-v8gg-4mq2-88q4
#### Github
No PoCs found on GitHub currently.