GHSA-583x-23h9-f5w7

Suggest an improvement
Source
https://github.com/advisories/GHSA-583x-23h9-f5w7
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/04/GHSA-583x-23h9-f5w7/GHSA-583x-23h9-f5w7.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-583x-23h9-f5w7
Aliases
Published
2023-04-19T18:33:22Z
Modified
2023-11-08T04:11:39.285750Z
Summary
Strapi does not verify the access or ID tokens issued during the OAuth flow
Details

Strapi 3.2.1 until 4.6.0 does not verify the access or ID tokens issued during the OAuth flow when the AWS Cognito login provider is used for authentication. A remote attacker could forge an ID token that is signed using the 'None' type algorithm to bypass authentication and impersonate any user that use AWS Cognito for authentication.

Database specific
{
    "nvd_published_at": "2023-04-19T16:15:07Z",
    "github_reviewed_at": "2023-04-24T18:43:51Z",
    "github_reviewed": true,
    "severity": "MODERATE",
    "cwe_ids": []
}
References

Affected packages

npm / @strapi/plugin-users-permissions

Package

Name
@strapi/plugin-users-permissions
View open source insights on deps.dev
Purl
pkg:npm/%40strapi/plugin-users-permissions

Affected ranges

Type
SEMVER
Events
Introduced
3.2.1
Fixed
4.6.0