In directus versions v9.0.0-beta.2 through 9.6.0 are vulnerable to server-side request forgery (SSRF) in the media upload functionality which allows a low privileged user to perform internal network port scans.
References
Link | Resource |
---|---|
https://github.com/directus/directus/commit/6da3f1ed5034115b1da00440008351bf0d808d83 | Patch Third Party Advisory |
https://www.mend.io/vulnerability-database/CVE-2022-23080 | Exploit Third Party Advisory |
https://github.com/directus/directus/commit/6da3f1ed5034115b1da00440008351bf0d808d83 | Patch Third Party Advisory |
https://www.mend.io/vulnerability-database/CVE-2022-23080 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:47
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/directus/directus/commit/6da3f1ed5034115b1da00440008351bf0d808d83 - Patch, Third Party Advisory | |
References | () https://www.mend.io/vulnerability-database/CVE-2022-23080 - Exploit, Third Party Advisory |
Information
Published : 2022-06-22 16:15
Updated : 2024-11-21 06:47
NVD link : CVE-2022-23080
Mitre link : CVE-2022-23080
CVE.ORG link : CVE-2022-23080
JSON object : View
Products Affected
rangerstudio
- directus
CWE
CWE-918
Server-Side Request Forgery (SSRF)