Directus is a real-time API and App dashboard for managing SQL database content. Prior to version 10.8.3, the exact Directus version number was being shipped in compiled JS bundles which are accessible without authentication. With this information a malicious attacker can trivially look for known vulnerabilities in Directus core or any of its shipped dependencies in that specific running version. The problem has been resolved in versions 10.8.3 and newer.
References
Configurations
No configuration.
History
21 Nov 2024, 09:04
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/directus/directus/commit/a5a1c26ac48795ed3212a4c51b9523588aff4fa0 - | |
References | () https://github.com/directus/directus/security/advisories/GHSA-5mhg-wv8w-p59j - | |
Summary |
|
01 Mar 2024, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-03-01 16:15
Updated : 2024-11-21 09:04
NVD link : CVE-2024-27296
Mitre link : CVE-2024-27296
CVE.ORG link : CVE-2024-27296
JSON object : View
Products Affected
No product.
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor