Exploit Report

Computer Security And Bug Information


CVE Title
Published Date2023-03-03T22:15Z
Modified Date2023-03-10T14:55Z
CWE TypeCWE-918
DescriptionDirectus is a real-time API and App dashboard for managing SQL database content. Directus is vulnerable to Server-Side Request Forgery (SSRF) when importing a file from a remote web server (POST to `/files/import`). An attacker can bypass the security controls by performing a DNS rebinding attack and view sensitive data from internal servers or perform a local port scan. An attacker can exploit this vulnerability to access highly sensitive internal server(s) and steal sensitive information. This issue was fixed in version 9.23.0.
By clicking these links you will leave this website. We do not endorse and will not be held accountable for any activity on external sites.
Reference URLhttps://github.com/directus/directus/security/advisories/GHSA-j3rg-3rgm-537h
Reference DescriptionMISC https://github.com/directus/directus/security/advisories/GHSA-j3rg-3rgm-537h
Reference URLhttps://github.com/directus/directus/commit/ff53d3e69a602d05342e15d9bb616884833ddbff
Reference DescriptionMISC https://github.com/directus/directus/commit/ff53d3e69a602d05342e15d9bb616884833ddbff
Reference URLhttps://github.com/directus/directus/releases/tag/v9.23.0
Reference DescriptionMISC https://github.com/directus/directus/releases/tag/v9.23.0
TagsExploit Third Party Advisory

This site's data is aggregated programmatically and provided "as is" without any representations or warranties, express or implied. Exploit.report is not affiliated with the The MITRE Corporation, U.S. Department of Homeland Security (DHS), Cybersecurity and Infrastructure Security Agency (CISA), or US government in any way. CVE and the CVE logo are registered trademarks of The MITRE Corporation

© 2022 Exploit.Report | Data | Contact | Privacy Policy | Articles