Strapi does not verify the access or ID tokens issued during the OAuth flow

Strapi 3.2.1 until 4.6.0 does not verify the access or ID tokens issued during the OAuth flow when the AWS Cognito login provider is used for authentication. A remote attacker could forge an ID token ...

Continue Reading
Fedora 37 : gh / golang-github-cenkalti-backoff / golang-github-cli-crypto / etc (2023-cb20f08a4e)

The remote Fedora 37 host has packages installed that are affected by a vulnerability as referenced in the FEDORA-2023-cb20f08a4e advisory. - A maliciously crafted HTTP/2 stream could cause excessiv ...

Continue Reading

CVSS3 - HIGH

[SECURITY] Fedora 37 Update: golang-github-cli-oauth-1.0.1-2.fc37

A library for performing OAuth Device flow and Web application flow in Go client apps.Read More ...

Continue Reading

CVSS3 - HIGH

GhostToken Flaw Could Let Attackers Hide Malicious Apps in Google Cloud Platform

[![Google Cloud Platform](data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mP8Xw8AAoMBgDTD2qgAAAAASUVORK5CYII=)]() Cybersecurity researchers have disclosed details of a n ...

Continue Reading
Authentication Bypass

@strapi/plugin-users-permissions is vulnerable to Authentication Bypass. When using the `AWS Cognito` login provider for authentication, the library doesn't check access or ID tokens generated through ...

Continue Reading
CVE-2023-1092

This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will b ...

Continue Reading
CVE-2023-1093

This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will b ...

Continue Reading
Account Takeover and Persistence due to the Oauth Misconfiguration

## Team, May you all be well on your side of the screen. :) *. While Doing some research on thehttps://cal.com/, I was able to find a Pre-Account Takeover vulnerability. ## Proof of concept: *. I have ...

Continue Reading

Back to Main

Subscribe for the latest news: