CVE-2023-27481 – directus
Package
Manager: npm
Name: directus
Vulnerable Version: >=0 <9.16.0
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00213 pctl0.43945
Details
Directus vulnerable to extraction of password hashes through export querying ### Impact Users with read access to the `password` field in `directus_users` can extract the argon2 password hashes by brute forcing the export functionality combined with a `_starts_with` filter. This allows the user to enumerate the password hashes. ### Patches The problem has been patched by preventing any hashed/concealed field to be filtered against with the `_starts_with` or other string operator. ### Workarounds Ensuring that no user has `read` access to the `password` field in `directus_users` is sufficient to prevent this vulnerability. ### For more information If you have any questions or comments about this advisory: * Open a Discussion in [directus/directus](https://github.com/directus/directus/discussions/new) * Email us at [security@directus.io](mailto:security@directus.io)
Metadata
Created: 2023-03-08T17:13:05Z
Modified: 2023-03-08T17:13:05Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/03/GHSA-m5q3-8wgf-x8xf/GHSA-m5q3-8wgf-x8xf.json
CWE IDs: ["CWE-200"]
Alternative ID: GHSA-m5q3-8wgf-x8xf
Finding: F310
Auto approve: 1