CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
EPSS
Percentile
29.7%
Users with read access to the password
field in directus_users
can extract the argon2 password hashes by brute forcing the export functionality combined with a _starts_with
filter. This allows the user to enumerate the password hashes.
The problem has been patched by preventing any hashed/concealed field to be filtered against with the _starts_with
or other string operator.
Ensuring that no user has read
access to the password
field in directus_users
is sufficient to prevent this vulnerability.
If you have any questions or comments about this advisory: