logo

CVE-2022-36031 directus

Package

Manager: npm
Name: directus
Vulnerable Version: >=0 <9.15.0

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

EPSS: 0.00319 pctl0.54368

Details

Directus vulnerable to unhandled exception on illegal filename_disk value The Directus process can be aborted by having an authorized user update the `filename_disk` value to a folder and accessing that file through the `/assets` endpoint. The vulnerability is patched and released in v9.15.0. You can prevent this problem by making sure no (untrusted) non-admin users have permissions to update the `filename_disk` field on `directus_files`. ### For more information If you have any questions or comments about this advisory: * Open a Discussion in [directus/directus](https://github.com/directus/directus/discussions) * Email us at [security@directus.io](mailto:security@directus.io) ### Credits This vulnerability was first discovered and reported by Witold Gorecki.

Metadata

Created: 2022-08-30T20:18:48Z
Modified: 2022-08-30T20:18:48Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/08/GHSA-77qm-wvqq-fg79/GHSA-77qm-wvqq-fg79.json
CWE IDs: ["CWE-755"]
Alternative ID: GHSA-77qm-wvqq-fg79
Finding: F096
Auto approve: 1