Lucene search

K
vulnrichmentGitHub_MVULNRICHMENT:CVE-2024-39699
HistoryJul 08, 2024 - 3:32 p.m.

CVE-2024-39699 Directus has a Blind SSRF On File Import

2024-07-0815:32:04
CWE-918
GitHub_M
github.com
4
cve-2024-39699
directus
blind ssrf
bypasses internal ip check
file import
security vulnerability
response interception

CVSS3

5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N

AI Score

7.6

Confidence

Low

EPSS

0

Percentile

14.3%

SSVC

Exploitation

poc

Automatable

no

Technical Impact

partial

Directus is a real-time API and App dashboard for managing SQL database content. There was already a reported SSRF vulnerability via file import. It was fixed by resolving all DNS names and checking if the requested IP is an internal IP address. However it is possible to bypass this security measure and execute a SSRF using redirects. Directus allows redirects when importing file from the URL and does not check the result URL. Thus, it is possible to execute a request to an internal IP, for example to 127.0.0.1. However, it is blind SSRF, because Directus also uses response interception technique to get the information about the connect from the socket directly and it does not show a response if the IP address is internal. This vulnerability is fixed in 10.9.3.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:monospace:directus:*:*:*:*:*:*:*:*"
    ],
    "vendor": "monospace",
    "product": "directus",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "lessThan": "10.9.3",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N

AI Score

7.6

Confidence

Low

EPSS

0

Percentile

14.3%

SSVC

Exploitation

poc

Automatable

no

Technical Impact

partial

Related for VULNRICHMENT:CVE-2024-39699