CVE-2023-48218
CVSS V2 None
CVSS V3 None
Description
The Strapi Protected Populate Plugin protects `get` endpoints from revealing too much information. Prior to version 1.3.4, users were able to bypass the field level security. Users who tried to populate something that they didn't have access to could populate those fields anyway. This issue has been patched in version 1.3.4. There are no known workarounds.
Overview
- CVE ID
- CVE-2023-48218
- Assigner
- GitHub_M
- Vulnerability Status
- PUBLISHED
- Published Version
- 2023-11-20T17:09:49.274Z
- Last Modified Date
- 2023-11-20T17:09:49.274Z
Weakness Enumerations
References
Reference URL | Reference Tags |
---|---|
https://github.com/strapi-community/strapi-plugin-protected-populate/security/advisories/GHSA-6h67-934r-82g7 | x_refsource_CONFIRM |
https://github.com/strapi-community/strapi-plugin-protected-populate/commit/05441066d64e09dd55937d9f089962e9ebe2fb39 | x_refsource_MISC |
https://github.com/strapi-community/strapi-plugin-protected-populate/releases/tag/v1.3.4 | x_refsource_MISC |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2023-48218 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48218 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2024-06-25 00:11:02 | Added to TrackCVE |