

Prior to version 3.2.0, github-action-merge-dependabot does not check if a commit created by dependabot is verified with the proper GPG key. Github-action-merge-dependabot is an action that automatically approves and merges dependabot pull requests (PRs). NOTE: the vendor's position is that a customer can already work around this by adjusting the configuration (i.e., by not using the default configuration).Ī lack of rate limiting in the 'forgot password' feature of Zammad v5.1.0 allows attackers to send an excessive amount of reset requests for a legitimate user, leading to a possible Denial of Service (DoS) via a large amount of generated e-mail messages. Specifically, the attacker must send X-Forwarded-Host to the /index.php?p=admin/actions/users/send-password-reset-email URI.

Lync for mac 2013 chrome the website sent back unusual full#
In a worst-case scenario, a low-privileged user could get access to a “super admin” account with full control over the Strapi instance, and could read and modify any data as well as block access to both the admin panel and API by revoking privileges for all other users.Ĭraft CMS through 3.7.36 allows a remote unauthenticated attacker, who knows at least one valid username, to reset the account's password and take over the account by providing a crafted HTTP header to the application while using the password reset functionality. Access to this information enables a user to compromise other users’ accounts by successfully invoking the password reset workflow. There are also many other scenarios where such details from other users can leak in the JSON response, either through a direct or indirect relationship.

For example, a low-privileged “author” role account can view these details in the JSON response for an “editor” or “super admin” that has updated one of the author’s blog posts. In a worst-case scenario, a low-privileged user could get access to a high-privileged API account, and could read and modify any data as well as block access to both the admin panel and API by revoking privileges for all other users.Īn authenticated user with access to the Strapi admin panel can view private and sensitive data, such as email and password reset tokens, for other admin panel users that have a relationship (e.g., created by, updated by) with content accessible to the authenticated user. Access to this information enables a user to compromise these users’ accounts if the password reset API endpoints have been enabled. There are many scenarios in which such details from API users can leak in the JSON response within the admin panel, either through a direct or indirect relationship. App/models/user.rb in Mastodon before 3.5.0 allows a bypass of e-mail restrictions.Īn authenticated user with access to the Strapi admin panel can view private and sensitive data, such as email and password reset tokens, for API users if content types accessible to the authenticated user contain relationships to API users (from:users-permissions).
