Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. @strapi/plugin-users-permissions
  4. ›
  5. CVE-2024-34065

CVE-2024-34065: @strapi/plugin-users-permissions leaks 3rd party authentication tokens and authentication bypass

June 12, 2024

By combining two vulnerabilities (an Open Redirect and session token sent as URL query parameter) in Strapi framework is its possible of an unauthenticated attacker to bypass authentication mechanisms and retrieve the 3rd party tokens. The attack requires user interaction (one click).

References

  • github.com/advisories/GHSA-wrvh-rcmr-9qfc
  • github.com/strapi/strapi
  • github.com/strapi/strapi/commit/9c79921d22142a5de77ea26151550a14e4b12669
  • github.com/strapi/strapi/security/advisories/GHSA-wrvh-rcmr-9qfc
  • nvd.nist.gov/vuln/detail/CVE-2024-34065

Code Behaviors & Features

Detect and mitigate CVE-2024-34065 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 4.24.2

Fixed versions

  • 4.24.2

Solution

Upgrade to version 4.24.2 or above.

Impact 7.1 HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N

Learn more about CVSS

Weakness

  • CWE-294: Authentication Bypass by Capture-replay
  • CWE-601: URL Redirection to Untrusted Site ('Open Redirect')

Source file

npm/@strapi/plugin-users-permissions/CVE-2024-34065.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:44 +0000.