Miggo Logo

CVE-2024-34065: @strapi/plugin-users-permissions leaks 3rd party authentication tokens and authentication bypass

7.1

CVSS Score
3.1

Basic Information

EPSS Score
0.35677%
Published
6/12/2024
Updated
11/20/2024
KEV Status
No
Technology
TechnologyJavaScript

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
@strapi/plugin-users-permissionsnpm< 4.24.24.24.2

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The primary vulnerability stems from two key functions: 1) The connect controller's unsafe handling of user-controlled callback parameters without origin/path validation, allowing open redirects that expose session cookies. 2) The callback route's transmission of sensitive access tokens in URL parameters. These functions work in tandem - the open redirect enables stealing session data containing OAuth configuration, while the token-in-URL pattern allows capturing authentication tokens. The commit diff shows fixes specifically targeting the callback validation in the connect() function, confirming its central role in the vulnerability.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Summ*ry *y *om*inin* two vuln*r**iliti*s (*n `Op*n R**ir**t` *n* `s*ssion tok*n s*nt *s URL qu*ry p*r*m*t*r`) in Str*pi *r*m*work is its possi*l* o* *n un*ut**nti**t** *tt**k*r to *yp*ss *ut**nti**tion m****nisms *n* r*tri*v* t** *r* p*rty tok*n

Reasoning

T** prim*ry vuln*r**ility st*ms *rom two k*y *un*tions: *) T** `*onn**t` *ontroll*r's uns*** **n*lin* o* us*r-*ontroll** **ll***k p*r*m*t*rs wit*out ori*in/p*t* `v*li**tion`, *llowin* op*n r**ir**ts t**t *xpos* s*ssion *ooki*s. *) T** **ll***k rout*'