In Directus, versions 9.0.0-alpha.4 through 9.4.1 are vulnerable to stored Cross-Site Scripting (XSS) vulnerability via SVG file upload in media upload functionality. A low privileged attacker can inject arbitrary javascript code which will be executed in a victim’s browser when they open the image URL.
References
Link | Resource |
---|---|
https://github.com/directus/directus/commit/ec86d5412d45136915d9b622b4a890dd26932b10 | Patch Third Party Advisory |
https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22116 | Exploit Third Party Advisory |
https://github.com/directus/directus/commit/ec86d5412d45136915d9b622b4a890dd26932b10 | Patch Third Party Advisory |
https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22116 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:46
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/directus/directus/commit/ec86d5412d45136915d9b622b4a890dd26932b10 - Patch, Third Party Advisory | |
References | () https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22116 - Exploit, Third Party Advisory |
Information
Published : 2022-01-10 16:15
Updated : 2024-11-21 06:46
NVD link : CVE-2022-22116
Mitre link : CVE-2022-22116
CVE.ORG link : CVE-2022-22116
JSON object : View
Products Affected
rangerstudio
- directus
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')