Lucene search

K
nvd[email protected]NVD:CVE-2024-6533
HistoryAug 15, 2024 - 3:15 a.m.

CVE-2024-6533

2024-08-1503:15:04
CWE-79
web.nvd.nist.gov
7
directus application security
javascript injection
dom element sanitation
account takeover

CVSS3

5.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

EPSS

0

Percentile

14.6%

Directus v10.13.0 allows an authenticated external attacker to execute arbitrary JavaScript on the client. This is possible because the application injects an attacker-controlled parameter that will be stored in the server and used by the client into an unsanitized DOM element. When chained with CVE-2024-6534, it could result in account takeover.

Affected configurations

Nvd
Node
monospacedirectusMatch10.13.0
VendorProductVersionCPE
monospacedirectus10.13.0cpe:2.3:a:monospace:directus:10.13.0:*:*:*:*:*:*:*

CVSS3

5.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

EPSS

0

Percentile

14.6%