CWE
74
Advisory Published
Advisory Published
Updated

CVE-2023-22621

First published: Wed Apr 19 2023(Updated: )

### Summary Strapi through 4.5.5 allows authenticated Server-Side Template Injection (SSTI) that can be exploited to execute arbitrary code on the server. ### Details Strapi through 4.5.5 allows authenticated Server-Side Template Injection (SSTI) that can be exploited to execute arbitrary code on the server. A remote attacker with access to the Strapi admin panel can inject a crafted payload that executes code on the server into an email template that bypasses the validation checks that should prevent code execution. ### IoC Using just the request log files, the only IoC to search for is a `PUT` request to URL path `/users-permissions/email-templates`. This IoC only indicates that a Strapi email template was modified on your server and by itself does not indicate if your Strapi server has been compromised. If this IoC is detected, you will need to manually review your email templates on your Strapi server and backups of your database to see if any of the templates contain a `lodash` template delimiter (eg. `<%STUFF HERE%>`) that contains suspicious JavaScript code. Generally speaking these templates should look like the following, you may have minor adjustments but any unrecognized code should be considered suspicious. Reset Password Template: ```html <p>We heard that you lost your password. Sorry about that!</p> <p>But don’t worry! You can use the following link to reset your password:</p> <p><%= URL %>?code=<%= TOKEN %></p> <p>Thanks.</p> ``` Email Confirmation Template: ```html <p>Thank you for registering!</p> <p>You have to confirm your email address. Please click on the link below.</p> <p><%= URL %>?confirmation=<%= CODE %></p> <p>Thanks.</p> ``` Specifically you should look for odd code contained within the `<%STUFF HERE%>` blocks as this is what is used to bypass the lodash templating system. If you find any code that is not a variable name, or a variable name that is not defined in the template you are most likely impacted and should take immediate steps to confirm there are no malicious applications running on your servers. ### Impact All users on Strapi below 4.5.6 with access to the admin panel and the ability to modify the email templates

Credit: cve@mitre.org cve@mitre.org

Affected SoftwareAffected VersionHow to fix
Strapi Strapi>=3.0.0<4.5.6
npm/@strapi/plugin-email<4.5.6
4.5.6
npm/@strapi/plugin-users-permissions<4.5.6
4.5.6

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is CVE-2023-22621?

    CVE-2023-22621 is a vulnerability in Strapi through version 4.5.5 that allows authenticated Server-Side Template Injection (SSTI), which can be exploited to execute arbitrary code on the server.

  • How severe is CVE-2023-22621?

    CVE-2023-22621 has a severity rating of high, with a CVSS score of 7.2.

  • How can CVE-2023-22621 be exploited?

    CVE-2023-22621 can be exploited by a remote attacker with access to the Strapi admin panel, who can inject a crafted payload into an email template, bypassing security measures and executing arbitrary code on the server.

  • What software versions are affected by CVE-2023-22621?

    CVE-2023-22621 affects Strapi versions from 3.0.0 to 4.5.6.

  • Is there a patch available for CVE-2023-22621?

    Yes, patches for CVE-2023-22621 are available in the Strapi releases (https://github.com/strapi/strapi/releases). It is recommended to update to a fixed version of Strapi to mitigate the vulnerability.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203