First published: Sat Feb 26 2022(Updated: )
Arbitrary Command Injection in GitHub repository strapi/strapi prior to 4.1.0.
Credit: security@huntr.dev security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
Strapi Strapi | <4.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this issue is CVE-2022-0764.
The severity of CVE-2022-0764 is high (6.7).
The affected software for CVE-2022-0764 is Strapi prior to 4.1.0.
To fix CVE-2022-0764, upgrade Strapi to version 4.1.0 or above.
Yes, here are some references for CVE-2022-0764: [GitHub commit](https://github.com/strapi/strapi/commit/2a3f5e988be6a2c7dae5ac22b9e86d579b462f4c), [GitHub issue](https://github.com/strapi/strapi/issues/12879), [Huntr bounty](https://huntr.dev/bounties/001d1c29-805a-4035-93bb-71a0e81da3e5).