Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2022-30618
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
An authenticated user with access to the Strapi admin panel can view private and sensitive data, such as email and password reset tokens, for API users if content types accessible to the authenticated user contain relationships to API users (from:users-permissions). There are many scenarios in which such details from API users can leak in the JSON response within the admin panel, either through a direct or indirect relationship. Access to this information enables a user to compromise these users’ accounts if the password reset API endpoints have been enabled. In a worst-case scenario, a low-privileged user could get access to a high-privileged API account, and could read and modify any data as well as block access to both the admin panel and API by revoking privileges for all other users.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
敏感数据的不恰当跨边界移除
Source: NVD (National Vulnerability Database)
Vulnerability Title
Strapi 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Strapi是一套开源的内容管理系统(CMS)。 Strapi 3.6.9版本之前的3.0版本和4.1.9版本之前的4.0版本存在安全漏洞,该漏洞源于来自 API 用户的详细信息可能会通过直接或间接关系泄漏到管理面板中的 JSON 响应中。如果启用了密码重置 API 端点,则访问此信息使用户能够破坏这些用户的帐户。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
StrapiStrapi < 3.6.10 -
II. Public POCs for CVE-2022-30618
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2022-30618
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2022-30618

No comments yet


Leave a comment