#VU24842 Resource exhaustion in strapi
Published: February 3, 2020
strapi
strapi.io
Description
The vulnerability allows a remote user to perform a denial of service (DoS) attack.
The vulnerability exists due to the sanitisation regex in "installPlugin" and "uninstallPlugin" handler functions for the admin panel allows the dash - character. A remote administrator can pass valid arguments like -h, -v, --help which will be passed to "execa()" and restart a server.