CVE-2019-19609

Scores

EPSS

0.811high81.1%
0%20%40%60%80%100%

Percentile: 81.1%

CVSS

7.2high3.x
0246810

CVSS Score: 7.2/10

All CVSS Scores

CVSS 3.x
7.2

Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

CVSS 2.0
9.0

Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C

Description

The Strapi framework before 3.0.0-beta.17.8 is vulnerable to Remote Code Execution in the Install and Uninstall Plugin components of the Admin panel, because it does not sanitize the plugin name, and attackers can inject arbitrary shell commands to be executed by the execa function.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

nvd

CWEs

CWE-78

Exploits

Exploit ID: 50238

Source: exploitdb

URL: https://www.exploit-db.com/exploits/50238

Exploit ID: CVE-2019-19609

Source: github-poc

URL: https://github.com/glowbase/CVE-2019-19609

Vulnerable Software (1)

Type: Configuration

Vendor: *

Product: strapi

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:strapi:strapi:*:*:*:*:*:*:*:*",      "versionEndIncluding": "1.6.4",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:a:strapi:st...

Source: nvd

End of list