Vulnerability Details : CVE-2019-18818
Public exploit exists!
strapi before 3.0.0-beta.17.5 mishandles password resets within packages/strapi-admin/controllers/Auth.js and packages/strapi-plugin-users-permissions/controllers/Auth.js.
Products affected by CVE-2019-18818
- cpe:2.3:a:strapi:strapi:*:*:*:*:*:*:*:*
- cpe:2.3:a:strapi:strapi:3.0.0:alpha10.1:*:*:*:*:*:*
- cpe:2.3:a:strapi:strapi:3.0.0:alpha10.2:*:*:*:*:*:*
- cpe:2.3:a:strapi:strapi:3.0.0:alpha10.3:*:*:*:*:*:*
- cpe:2.3:a:strapi:strapi:3.0.0:alpha11:*:*:*:*:*:*
- cpe:2.3:a:strapi:strapi:3.0.0:alpha11.1:*:*:*:*:*:*
- cpe:2.3:a:strapi:strapi:3.0.0:alpha11.2:*:*:*:*:*:*
- cpe:2.3:a:strapi:strapi:3.0.0:alpha11.3:*:*:*:*:*:*
- cpe:2.3:a:strapi:strapi:3.0.0:alpha12:*:*:*:*:*:*
- cpe:2.3:a:strapi:strapi:3.0.0:alpha12.1:*:*:*:*:*:*
- cpe:2.3:a:strapi:strapi:3.0.0:alpha12.1.3:*:*:*:*:*:*
- cpe:2.3:a:strapi:strapi:3.0.0:alpha12.2:*:*:*:*:*:*
- cpe:2.3:a:strapi:strapi:3.0.0:alpha12.3:*:*:*:*:*:*
- cpe:2.3:a:strapi:strapi:3.0.0:alpha12.4:*:*:*:*:*:*
- cpe:2.3:a:strapi:strapi:3.0.0:alpha12.5:*:*:*:*:*:*
- cpe:2.3:a:strapi:strapi:3.0.0:alpha12.6:*:*:*:*:*:*
- cpe:2.3:a:strapi:strapi:3.0.0:alpha12.7:*:*:*:*:*:*
- cpe:2.3:a:strapi:strapi:3.0.0:alpha12.7.1:*:*:*:*:*:*
- cpe:2.3:a:strapi:strapi:3.0.0:alpha13:*:*:*:*:*:*
- cpe:2.3:a:strapi:strapi:3.0.0:alpha13.0.1:*:*:*:*:*:*
- cpe:2.3:a:strapi:strapi:3.0.0:alpha13.1:*:*:*:*:*:*
- cpe:2.3:a:strapi:strapi:3.0.0:alpha14:*:*:*:*:*:*
- cpe:2.3:a:strapi:strapi:3.0.0:alpha14.1:*:*:*:*:*:*
- cpe:2.3:a:strapi:strapi:3.0.0:alpha14.1.1:*:*:*:*:*:*
- cpe:2.3:a:strapi:strapi:3.0.0:alpha14.2:*:*:*:*:*:*
- cpe:2.3:a:strapi:strapi:3.0.0:alpha14.3:*:*:*:*:*:*
- cpe:2.3:a:strapi:strapi:3.0.0:alpha14.4.0:*:*:*:*:*:*
- cpe:2.3:a:strapi:strapi:3.0.0:alpha14.5:*:*:*:*:*:*
- cpe:2.3:a:strapi:strapi:3.0.0:alpha15:*:*:*:*:*:*
- cpe:2.3:a:strapi:strapi:3.0.0:alpha16:*:*:*:*:*:*
- cpe:2.3:a:strapi:strapi:3.0.0:alpha17:*:*:*:*:*:*
- cpe:2.3:a:strapi:strapi:3.0.0:alpha18:*:*:*:*:*:*
- cpe:2.3:a:strapi:strapi:3.0.0:alpha19:*:*:*:*:*:*
- cpe:2.3:a:strapi:strapi:3.0.0:alpha20:*:*:*:*:*:*
- cpe:2.3:a:strapi:strapi:3.0.0:alpha21:*:*:*:*:*:*
- cpe:2.3:a:strapi:strapi:3.0.0:alpha22:*:*:*:*:*:*
- cpe:2.3:a:strapi:strapi:3.0.0:alpha23:*:*:*:*:*:*
- cpe:2.3:a:strapi:strapi:3.0.0:alpha23.1:*:*:*:*:*:*
- cpe:2.3:a:strapi:strapi:3.0.0:alpha24:*:*:*:*:*:*
- cpe:2.3:a:strapi:strapi:3.0.0:alpha24.1:*:*:*:*:*:*
- cpe:2.3:a:strapi:strapi:3.0.0:alpha25:*:*:*:*:*:*
- cpe:2.3:a:strapi:strapi:3.0.0:alpha25.1:*:*:*:*:*:*
- cpe:2.3:a:strapi:strapi:3.0.0:alpha25.2:*:*:*:*:*:*
- cpe:2.3:a:strapi:strapi:3.0.0:alpha26:*:*:*:*:*:*
- cpe:2.3:a:strapi:strapi:3.0.0:alpha26.1:*:*:*:*:*:*
- cpe:2.3:a:strapi:strapi:3.0.0:alpha26.2:*:*:*:*:*:*
- cpe:2.3:a:strapi:strapi:3.0.0:alpha4:*:*:*:*:*:*
- cpe:2.3:a:strapi:strapi:3.0.0:alpha4.8:*:*:*:*:*:*
- cpe:2.3:a:strapi:strapi:3.0.0:alpha5.3:*:*:*:*:*:*
- cpe:2.3:a:strapi:strapi:3.0.0:alpha5.5:*:*:*:*:*:*
- cpe:2.3:a:strapi:strapi:3.0.0:alpha6.3:*:*:*:*:*:*
- cpe:2.3:a:strapi:strapi:3.0.0:alpha6.4:*:*:*:*:*:*
- cpe:2.3:a:strapi:strapi:3.0.0:alpha6.7:*:*:*:*:*:*
- cpe:2.3:a:strapi:strapi:3.0.0:alpha7.2:*:*:*:*:*:*
- cpe:2.3:a:strapi:strapi:3.0.0:alpha7.3:*:*:*:*:*:*
- cpe:2.3:a:strapi:strapi:3.0.0:alpha8:*:*:*:*:*:*
- cpe:2.3:a:strapi:strapi:3.0.0:alpha8.3:*:*:*:*:*:*
- cpe:2.3:a:strapi:strapi:3.0.0:alpha9:*:*:*:*:*:*
- cpe:2.3:a:strapi:strapi:3.0.0:alpha9.1:*:*:*:*:*:*
- cpe:2.3:a:strapi:strapi:3.0.0:alpha9.2:*:*:*:*:*:*
- cpe:2.3:a:strapi:strapi:3.0.0:beta0:*:*:*:*:*:*
- cpe:2.3:a:strapi:strapi:3.0.0:beta1:*:*:*:*:*:*
- cpe:2.3:a:strapi:strapi:3.0.0:beta10:*:*:*:*:*:*
- cpe:2.3:a:strapi:strapi:3.0.0:beta11:*:*:*:*:*:*
- cpe:2.3:a:strapi:strapi:3.0.0:beta12:*:*:*:*:*:*
- cpe:2.3:a:strapi:strapi:3.0.0:beta13:*:*:*:*:*:*
- cpe:2.3:a:strapi:strapi:3.0.0:beta14:*:*:*:*:*:*
- cpe:2.3:a:strapi:strapi:3.0.0:beta15:*:*:*:*:*:*
- cpe:2.3:a:strapi:strapi:3.0.0:beta16:*:*:*:*:*:*
- cpe:2.3:a:strapi:strapi:3.0.0:beta16.1:*:*:*:*:*:*
- cpe:2.3:a:strapi:strapi:3.0.0:beta16.2:*:*:*:*:*:*
- cpe:2.3:a:strapi:strapi:3.0.0:beta16.3:*:*:*:*:*:*
- cpe:2.3:a:strapi:strapi:3.0.0:beta16.4:*:*:*:*:*:*
- cpe:2.3:a:strapi:strapi:3.0.0:beta16.5:*:*:*:*:*:*
- cpe:2.3:a:strapi:strapi:3.0.0:beta16.6:*:*:*:*:*:*
- cpe:2.3:a:strapi:strapi:3.0.0:beta16.7:*:*:*:*:*:*
- cpe:2.3:a:strapi:strapi:3.0.0:beta16.8:*:*:*:*:*:*
- cpe:2.3:a:strapi:strapi:3.0.0:beta17:*:*:*:*:*:*
- cpe:2.3:a:strapi:strapi:3.0.0:beta17.1:*:*:*:*:*:*
- cpe:2.3:a:strapi:strapi:3.0.0:beta17.2:*:*:*:*:*:*
- cpe:2.3:a:strapi:strapi:3.0.0:beta17.3:*:*:*:*:*:*
- cpe:2.3:a:strapi:strapi:3.0.0:beta17.4:*:*:*:*:*:*
- cpe:2.3:a:strapi:strapi:3.0.0:beta2:*:*:*:*:*:*
- cpe:2.3:a:strapi:strapi:3.0.0:beta3:*:*:*:*:*:*
- cpe:2.3:a:strapi:strapi:3.0.0:beta4:*:*:*:*:*:*
- cpe:2.3:a:strapi:strapi:3.0.0:beta5:*:*:*:*:*:*
- cpe:2.3:a:strapi:strapi:3.0.0:beta6:*:*:*:*:*:*
- cpe:2.3:a:strapi:strapi:3.0.0:beta7:*:*:*:*:*:*
- cpe:2.3:a:strapi:strapi:3.0.0:beta8:*:*:*:*:*:*
- cpe:2.3:a:strapi:strapi:3.0.0:beta9:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2019-18818
94.01%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 100 %
Percentile, the proportion of vulnerabilities that are scored at or less
Metasploit modules for CVE-2019-18818
-
Strapi CMS Unauthenticated Password Reset
Disclosure Date: 2022-02-09First seen: 2024-11-22auxiliary/scanner/http/strapi_3_password_resetThis module abuses the mishandling of a password reset request for Strapi CMS version 3.0.0-beta.17.4 to change the password of the admin user. Successfully tested against Strapi CMS version 3.0.0-beta.17.4. Authors: - WackyH4cker - h00die
CVSS scores for CVE-2019-18818
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST | |
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
CWE ids for CVE-2019-18818
-
The product contains a mechanism for users to recover or change their passwords without knowing the original password, but the mechanism is weak.Assigned by: nvd@nist.gov (Primary)
References for CVE-2019-18818
-
http://packetstormsecurity.com/files/163939/Strapi-3.0.0-beta-Authentication-Bypass.html
Strapi 3.0.0-beta Authentication Bypass ≈ Packet StormExploit;Third Party Advisory;VDB Entry
-
http://packetstormsecurity.com/files/165896/Strapi-CMS-3.0.0-beta.17.4-Privilege-Escalation.html
Strapi CMS 3.0.0-beta.17.4 Privilege Escalation ≈ Packet StormExploit;Third Party Advisory;VDB Entry
-
https://github.com/strapi/strapi/pull/4443
Fix security issue with reset password by alexandrebodin · Pull Request #4443 · strapi/strapi · GitHubThird Party Advisory
-
https://github.com/strapi/strapi/releases/tag/v3.0.0-beta.17.5
Release v3.0.0-beta.17.5 · strapi/strapi · GitHubRelease Notes;Third Party Advisory
-
https://www.npmjs.com/advisories/1311
npmThird Party Advisory
-
http://packetstormsecurity.com/files/163950/Strapi-CMS-3.0.0-beta.17.4-Remote-Code-Execution.html
Strapi CMS 3.0.0-beta.17.4 Remote Code Execution ≈ Packet StormExploit;Third Party Advisory;VDB Entry
Jump to