Strapi before 3.0.2 could allow a remote authenticated attacker to bypass security restrictions because templates are stored in a global variable without any sanitation. By sending a specially crafted request, an attacker could exploit this vulnerability to update the email template for both password reset and account confirmation emails.
References
Link Resource
https://exchange.xforce.ibmcloud.com/vulnerabilities/183045 Third Party Advisory VDB Entry
https://github.com/strapi/strapi/pull/6599 Third Party Advisory
https://github.com/strapi/strapi/releases/tag/v3.0.2 Release Notes Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2020-06-19T16:29:37

Updated: 2020-06-19T16:29:37

Reserved: 2020-06-08T00:00:00


Link: CVE-2020-13961

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2020-06-19T17:15:14.147

Modified: 2020-06-24T16:18:05.913


Link: CVE-2020-13961

JSON object: View

cve-icon Redhat Information

No data.

CWE