directus@10.12.1 vulnerabilities

Directus is a real-time API and App dashboard for managing SQL database content

  • latest version

    11.9.2

  • latest non vulnerable version

  • first published

    4 years ago

  • latest version published

    4 days ago

  • licenses detected

  • Direct Vulnerabilities

    Known vulnerabilities in the directus package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • M
    Improper Privilege Management

    directus is a Directus is a real-time API and App dashboard for managing SQL database content.

    Affected versions of this package are vulnerable to Improper Privilege Management via the Share feature. An attacker can escalate privileges and access data or functionalities that are normally restricted by specifying an arbitrary role during the item sharing process. This is only exploitable if the instance uses the share feature and has specific roles hierarchy and fields that are not visible for certain roles.

    How to fix Improper Privilege Management?

    Upgrade directus to version 11.2.0 or higher.

    <11.2.0
    • M
    Cross-site Scripting (XSS)

    directus is a Directus is a real-time API and App dashboard for managing SQL database content.

    Affected versions of this package are vulnerable to Cross-site Scripting (XSS) through the layout_options due to improper user input sanitization in the setContent function. An attacker can execute arbitrary scripts in the context of the user's session by injecting malicious JavaScript into unsanitized DOM elements that are subsequently rendered by the client. This is only exploitable if the attacker has permissions to modify or create presets for other users or can chain with another vulnerability to escalate privileges.

    How to fix Cross-site Scripting (XSS)?

    Upgrade directus to version 11.3.3 or higher.

    <11.3.3
    • M
    Authorization Bypass Through User-Controlled Key

    directus is a Directus is a real-time API and App dashboard for managing SQL database content.

    Affected versions of this package are vulnerable to Authorization Bypass Through User-Controlled Key via the PATCH /presets endpoint when the application only validates the user parameter in the POST /presets request but not in the PATCH request. An attacker can modify presets created by the same user to assign them to another user by sending a crafted PATCH request with the victim's user ID. This is only exploitable if the attacker has valid authentication credentials and can access the preset ID.

    How to fix Authorization Bypass Through User-Controlled Key?

    Upgrade directus to version 10.13.2 or higher.

    <10.13.2
    • M
    Authorization Bypass Through User-Controlled Key

    directus is a Directus is a real-time API and App dashboard for managing SQL database content.

    Affected versions of this package are vulnerable to Authorization Bypass Through User-Controlled Key via the POST /presets and PATCH requests. An authenticated attacker can modify presets created by the same user to assign them to another user by exploiting the lack of validation for the user parameter in the PATCH request.

    Note:

    When chained with CVE-2024-6533, it could result in account takeover.

    How to fix Authorization Bypass Through User-Controlled Key?

    Upgrade directus to version 10.13.2 or higher.

    <10.13.2
    • M
    Cross-site Scripting (XSS)

    directus is a Directus is a real-time API and App dashboard for managing SQL database content.

    Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via an attacker-controlled parameter that is stored on the server and subsequently used unsanitized in a DOM element. An attacker can execute arbitrary JavaScript on the client by injecting malicious code into this parameter.

    Note:

    When chained with CVE-2024-6534, it could result in account takeover.

    How to fix Cross-site Scripting (XSS)?

    Upgrade directus to version 11.3.3 or higher.

    <11.3.3
    • H
    Information Exposure

    directus is a Directus is a real-time API and App dashboard for managing SQL database content.

    Affected versions of this package are vulnerable to Information Exposure due to the error handling mechanism when integrating SSO with local authentication. An attacker can determine if a user is registered with an SSO provider by attempting to authenticate with an email that is already linked to an SSO account, which triggers a specific error message.

    How to fix Information Exposure?

    Upgrade directus to version 10.13.0 or higher.

    >=10.0.0 <10.13.0