Lucene search

K
githubGitHub Advisory DatabaseGHSA-Q83V-HQ3J-4PQ3
HistoryAug 15, 2024 - 6:32 a.m.

Improper access control in Directus

2024-08-1506:32:22
CWE-639
GitHub Advisory Database
github.com
9
directus
access control
authenticated attacker
modify presets
account takeover
cve-2024-6533

CVSS3

5.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

AI Score

6.4

Confidence

Low

EPSS

0

Percentile

14.6%

Directus v10.13.0 allows an authenticated external attacker to modify presets created by the same user to assign them to another user. This is possible because the application only validates the user parameter in the β€˜POST /presets’ request but not in the PATCH request. When chained with CVE-2024-6533, it could result in account takeover.

Affected configurations

Vulners
Node
directusdirectusRange≀10.13.0
VendorProductVersionCPE
directusdirectus*cpe:2.3:a:directus:directus:*:*:*:*:*:*:*:*

CVSS3

5.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

AI Score

6.4

Confidence

Low

EPSS

0

Percentile

14.6%