CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
EPSS
Percentile
34.1%
The Directus process can be aborted by having an authorized user update the filename_disk
value to a folder and accessing that file through the /assets
endpoint.
The vulnerability is patched and released in v9.15.0.
You can prevent this problem by making sure no (untrusted) non-admin users have permissions to update the filename_disk
field on directus_files
.
If you have any questions or comments about this advisory:
This vulnerability was first discovered and reported by Witold Gorecki.