Description
The Strapi framework before 3.0.0-beta.17.8 is vulnerable to Remote Code Execution in the Install and Uninstall Plugin components of the Admin panel, because it does not sanitize the plugin name, and attackers can inject arbitrary shell commands to be executed by the execa function.
Remediation
References
http://packetstormsecurity.com/files/163940/Strapi-3.0.0-beta.17.7-Remote-Code-Execution.html
http://packetstormsecurity.com/files/163950/Strapi-CMS-3.0.0-beta.17.4-Remote-Code-Execution.html
https://bittherapy.net/post/strapi-framework-remote-code-execution/
https://github.com/strapi/strapi/pull/4636
Related Vulnerabilities
CVE-2020-7788 Vulnerability in maven package org.webjars.npm:ini
CVE-2022-36010 Vulnerability in npm package react-editable-json-tree
CVE-2021-39168 Vulnerability in npm package @openzeppelin/contracts-upgradeable
CVE-2022-41915 Vulnerability in maven package io.netty:netty-codec
CVE-2020-7792 Vulnerability in maven package org.webjars:mout