First published: Tue May 03 2022(Updated: )
Storing passwords in a recoverable format in the DOCUMENTATION plugin component of Strapi before 3.6.9 and 4.x before 4.1.5 allows an attacker to access a victim's HTTP request, get the victim's cookie, perform a base64 decode on the victim's cookie, and obtain a cleartext password, leading to getting API documentation for further API attacks.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Strapi Strapi | <3.6.9 | |
Strapi Strapi | >=4.0.0<4.1.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-46440.
The severity of CVE-2021-46440 is high with a severity value of 7.5.
The DOCUMENTATION plugin component of Strapi before 3.6.9 and 4.x before 4.1.5 is affected by CVE-2021-46440.
CVE-2021-46440 allows an attacker to access a victim's password by performing a series of actions involving the victim's HTTP request and cookie.
Yes, the following references provide more information about CVE-2021-46440: [1] http://packetstormsecurity.com/files/166915/Strapi-3.6.8-Password-Disclosure-Insecure-Handling.html, [2] https://github.com/strapi/strapi/pull/12246, [3] https://hub.docker.com/r/strapi/strapi