{ "id": "CVE-2022-29894", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2022-06-13T05:15:11.357", "lastModified": "2024-11-21T06:59:55.433", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Strapi v3.x.x versions and earlier contain a stored cross-site scripting vulnerability in file upload function. By exploiting this vulnerability, an arbitrary script may be executed on the web browser of the user who is logging in to the product with the administrative privilege." }, { "lang": "es", "value": "Strapi versiones v3.x.x y anteriores, contienen una vulnerabilidad de tipo cross-site scripting almacenada en la funci\u00f3n file upload. Al explotar esta vulnerabilidad, puede ejecutarse un script arbitrario en el navegador web del usuario que est\u00e1 iniciando sesi\u00f3n en el producto con el privilegio administrativo" } ], "metrics": { "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "baseScore": 4.8, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "HIGH", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE" }, "exploitabilityScore": 1.7, "impactScore": 2.7 } ], "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-79" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:strapi:strapi:*:*:*:*:*:*:*:*", "versionEndIncluding": "3.6.10", "matchCriteriaId": "901D5E3A-58A8-4BA9-A63B-2F7E86D31A20" } ] } ] } ], "references": [ { "url": "https://github.com/strapi/strapi", "source": "vultures@jpcert.or.jp", "tags": [ "Product", "Third Party Advisory" ] }, { "url": "https://jvn.jp/en/jp/JVN44550983/index.html", "source": "vultures@jpcert.or.jp", "tags": [ "Third Party Advisory" ] }, { "url": "https://strapi.io/", "source": "vultures@jpcert.or.jp", "tags": [ "Vendor Advisory" ] }, { "url": "https://github.com/strapi/strapi", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product", "Third Party Advisory" ] }, { "url": "https://jvn.jp/en/jp/JVN44550983/index.html", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ] }, { "url": "https://strapi.io/", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ] } ] }