OS Command Injection in strapi - #VU23928
Published: January 5, 2020
strapi
Detailed vulnerability description
The vulnerability allows a remote attacker to execute arbitrary shell commands on the target system.
The vulnerability exists due to sanitize plugin names in the /admin/plugins/install/ route. An authenticated attacker with admin privileges to run arbitrary commands in the server.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
Remediation
Cybersecurity Help is currently unaware of any official solution to address this vulnerability.
As a temporary solution it is possible to install version 3.0.0-beta.17.8.