First published: Wed Apr 19 2023(Updated: )
Strapi through 4.5.5 does not verify the access or ID tokens issued during the OAuth flow when the AWS Cognito login provider is used for authentication. A remote attacker could forge an ID token that is signed using the 'None' type algorithm to bypass authentication and impersonate any user that use AWS Cognito for authentication.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
npm/@strapi/plugin-users-permissions | >=3.2.1<4.6.0 | 4.6.0 |
Strapi Strapi | >=3.0.0<4.6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-22893 is a vulnerability in Strapi through version 4.5.5 that allows a remote attacker to bypass authentication and impersonate any user when the AWS Cognito login provider is used.
CVE-2023-22893 has a severity score of 7.5 (high).
CVE-2023-22893 allows an attacker to forge an ID token that is signed using the 'None' type algorithm, bypassing authentication and gaining unauthorized access to impersonate users.
Yes, to fix CVE-2023-22893, users should update Strapi to version 4.6.0 or newer.
You can find more information about CVE-2023-22893 in the Strapi releases page, the Strapi security disclosure blog post, and the Ghost Camm blog post.