Strapi Cognito Provider Authentication Bypass

high Web App Scanning Plugin ID 114041

Synopsis

Strapi Cognito Provider Authentication Bypass

Description

Strapi is a popular open-source headless CMS built with Node.js. Strapi versions after 3.2.0 and before 4.6.0 suffer from a lack of validation of JWT tokens sent through the AWS Cognito authentication provider during the OAuth flow.

By forging a custom JWT token with any signature, a remote and unauthenticated attacker can impersonate any user who use AWS Cognito to authenticate against the target application.

Solution

Upgrade to Strapi version 4.6.0 or latest.

See Also

https://strapi.io/blog/security-disclosure-of-vulnerabilities-cve

https://www.ghostccamm.com/blog/multi_strapi_vulns/#cve-2023-22893-authentication-bypass-for-aws-cognito-login-provider-in-strapi-versions-456

Plugin Details

Severity: High

ID: 114041

Type: remote

Published: 10/5/2023

Updated: 10/5/2023

Scan Template: basic, full, pci, scan

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: High

Base Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:N/A:N

CVSS Score Source: CVE-2023-22893

CVSS v3

Risk Factor: High

Base Score: 7.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

CVSS Score Source: CVE-2023-22893

Vulnerability Information

CPE: cpe:2.3:a:strapi:strapi:*:*:*:*:*:*:*:*

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 4/17/2023

Vulnerability Publication Date: 4/17/2023

Reference Information

CVE: CVE-2023-22893