logo

CVE-2023-38503 directus

Package

Manager: npm
Name: directus
Vulnerable Version: >=10.3 <10.5.0

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00107 pctl0.29485

Details

Incorrect Permission Checking for GraphQL Subscriptions ### Summary CWE-200: Exposure of Sensitive Information to an Unauthorized Actor Access to information you should not have access to when the permissions rely on `$CURRENT_USER` for filtering. ### Details The permission filters (i.e. `user_created IS $CURRENT_USER`) are not properly checked when using GraphQL subscription resulting in unauthorized users getting event on their subscription which they should not be receiving according to the permissions. This can be any collection but out-of-the box the `directus_users` collection is configured with such a permissions filter allowing you to get updates for other users when changes happen. An example: ```graphql subscription { directus_users_mutated { event data { id last_access last_page } } } ``` ### Patches https://github.com/directus/directus/pull/19155 ### Workarounds Disable GraphQL Subscriptions ### References

Metadata

Created: 2023-07-25T23:31:10Z
Modified: 2023-07-25T23:31:10Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/07/GHSA-gggm-66rh-pp98/GHSA-gggm-66rh-pp98.json
CWE IDs: ["CWE-200", "CWE-863"]
Alternative ID: GHSA-gggm-66rh-pp98
Finding: F310
Auto approve: 1