Lucene search

K
cveFluid AttacksCVE-2024-6533
HistoryAug 15, 2024 - 3:15 a.m.

CVE-2024-6533

2024-08-1503:15:04
CWE-79
Fluid Attacks
web.nvd.nist.gov
31
directus v10.13.0
authenticated external attacker
arbitrary javascript
unsanitized dom element
account takeover
cve-2024-6534

CVSS3

5.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

AI Score

4.8

Confidence

High

EPSS

0

Percentile

14.6%

Directus v10.13.0 allows an authenticated external attacker to execute arbitrary JavaScript on the client. This is possible because the application injects an attacker-controlled parameter that will be stored in the server and used by the client into an unsanitized DOM element. When chained with CVE-2024-6534, it could result in account takeover.

Affected configurations

Nvd
Node
monospacedirectusMatch10.13.0
VendorProductVersionCPE
monospacedirectus10.13.0cpe:2.3:a:monospace:directus:10.13.0:*:*:*:*:*:*:*

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "Directus",
    "vendor": "Directus",
    "versions": [
      {
        "status": "unknown",
        "version": "10.13.0"
      }
    ]
  }
]

CVSS3

5.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

AI Score

4.8

Confidence

High

EPSS

0

Percentile

14.6%