CVE-2024-28238 – directus
Package
Manager: npm
Name: directus
Vulnerable Version: >=0 <10.10.0
Severity
Level: Low
CVSS v3.1: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
CVSS v4.0: CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00088 pctl0.26094
Details
Session Token in URL in directus ### Impact When reaching the /files page, a JWT is passed via GET request. Inclusion of session tokens in URLs poses a security risk as URLs are often logged in various places (e.g., web server logs, browser history). Attackers gaining access to these logs may hijack active user sessions, leading to unauthorized access to sensitive information or actions on behalf of the user. ### Patches _Has the problem been patched? What versions should users upgrade to?_ ### Workarounds There's no workaround available. ### References _Are there any links users can visit to find out more?_
Metadata
Created: 2024-03-12T20:47:18Z
Modified: 2024-03-13T22:25:10Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/03/GHSA-2ccr-g2rv-h677/GHSA-2ccr-g2rv-h677.json
CWE IDs: ["CWE-200", "CWE-598"]
Alternative ID: GHSA-2ccr-g2rv-h677
Finding: F017
Auto approve: 1