mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
64 lines
3.2 KiB
JSON
64 lines
3.2 KiB
JSON
{
|
|
"id": "CVE-2024-31217",
|
|
"sourceIdentifier": "security-advisories@github.com",
|
|
"published": "2024-06-12T15:15:51.170",
|
|
"lastModified": "2024-06-13T18:36:09.010",
|
|
"vulnStatus": "Awaiting Analysis",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Strapi is an open-source content management system. Prior to version 4.22.0, a denial-of-service vulnerability is present in the media upload process causing the server to crash without restarting, affecting either development and production environments. Usually, errors in the application cause it to log the error and keep it running for other clients. This behavior, in contrast, stops the server execution, making it unavailable for any clients until it's manually restarted. Any user with access to the file upload functionality is able to exploit this vulnerability, affecting applications running in both development mode and production mode as well. Users should upgrade @strapi/plugin-upload to version 4.22.0 to receive a patch.\n"
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Strapi es un sistema de gesti\u00f3n de contenidos de c\u00f3digo abierto. Antes de la versi\u00f3n 4.22.0, hab\u00eda una vulnerabilidad de denegaci\u00f3n de servicio en el proceso de carga de medios que provocaba que el servidor fallara sin reiniciarse, lo que afectaba los entornos de desarrollo y producci\u00f3n. Por lo general, los errores en la aplicaci\u00f3n hacen que registre el error y lo mantenga ejecut\u00e1ndose para otros clientes. Este comportamiento, por el contrario, detiene la ejecuci\u00f3n del servidor, haci\u00e9ndolo no disponible para ning\u00fan cliente hasta que se reinicie manualmente. Cualquier usuario con acceso a la funci\u00f3n de carga de archivos puede aprovechar esta vulnerabilidad, lo que afecta tambi\u00e9n a las aplicaciones que se ejecutan tanto en modo de desarrollo como en modo de producci\u00f3n. Los usuarios deben actualizar @strapi/plugin-upload a la versi\u00f3n 4.22.0 para recibir un parche."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "security-advisories@github.com",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "HIGH",
|
|
"privilegesRequired": "LOW",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "HIGH",
|
|
"baseScore": 5.3,
|
|
"baseSeverity": "MEDIUM"
|
|
},
|
|
"exploitabilityScore": 1.6,
|
|
"impactScore": 3.6
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "security-advisories@github.com",
|
|
"type": "Secondary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-248"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://github.com/strapi/strapi/commit/a0da7e73e1496d835fe71a2febb14f70170135c7",
|
|
"source": "security-advisories@github.com"
|
|
},
|
|
{
|
|
"url": "https://github.com/strapi/strapi/security/advisories/GHSA-pm9q-xj9p-96pm",
|
|
"source": "security-advisories@github.com"
|
|
}
|
|
]
|
|
} |