Lucene search

K
RangerstudioDirectus

11 matches found

CVE
CVE
added 2022/04/04 6:15 p.m.85 views

CVE-2022-24814

Directus is a real-time API and App dashboard for managing SQL database content. Prior to version 9.7.0, unauthorized JavaScript (JS) can be executed by inserting an iframe into the rich text html interface that links to a file uploaded HTML file that loads another uploaded JS file in its script ta...

8.8CVSS6.7AI score0.00408EPSS
CVE
CVE
added 2022/06/22 4:15 p.m.75 views

CVE-2022-23080

In directus versions v9.0.0-beta.2 through 9.6.0 are vulnerable to server-side request forgery (SSRF) in the media upload functionality which allows a low privileged user to perform internal network port scans.

5CVSS5.4AI score0.0017EPSS
CVE
CVE
added 2021/04/07 10:15 p.m.57 views

CVE-2021-29641

Directus 8 before 8.8.2 allows remote authenticated users to execute arbitrary code because file-upload permissions include the ability to upload a .php file to the main upload directory and/or upload a .php file and a .htaccess file to a subdirectory. Exploitation succeeds only for certain install...

8.8CVSS8.8AI score0.0565EPSS
CVE
CVE
added 2022/01/10 4:15 p.m.49 views

CVE-2022-22117

In Directus, versions 9.0.0-alpha.4 through 9.4.1 allow unrestricted file upload of .html files in the media upload functionality, which leads to Cross-Site Scripting vulnerability. A low privileged attacker can upload a crafted HTML file as a profile avatar, and when an admin or another user opens...

5.4CVSS5.1AI score0.00206EPSS
CVE
CVE
added 2022/01/10 4:15 p.m.47 views

CVE-2022-22116

In Directus, versions 9.0.0-alpha.4 through 9.4.1 are vulnerable to stored Cross-Site Scripting (XSS) vulnerability via SVG file upload in media upload functionality. A low privileged attacker can inject arbitrary javascript code which will be executed in a victim’s browser when they open the image...

5.4CVSS5.2AI score0.00206EPSS
CVE
CVE
added 2021/02/23 7:15 p.m.37 views

CVE-2021-26595

In Directus 8.x through 8.8.1, an attacker can learn sensitive information such as the version of the CMS, the PHP version used by the site, and the name of the DBMS, simply by view the result of the api-aa, called automatically upon a connection. NOTE: This vulnerability only affects products that...

5.3CVSS5.1AI score0.00108EPSS
CVE
CVE
added 2021/02/23 7:15 p.m.35 views

CVE-2021-26593

In Directus 8.x through 8.8.1, an attacker can see all users in the CMS using the API /users/{id}. For each call, they get in response a lot of information about the user (such as email address, first name, and last name) but also the secret for 2FA if one exists. This secret can be regenerated. NO...

7.5CVSS7.3AI score0.00316EPSS
CVE
CVE
added 2021/02/23 7:15 p.m.33 views

CVE-2021-27583

In Directus 8.x through 8.8.1, an attacker can discover whether a user is present in the database through the password reset feature. NOTE: This vulnerability only affects products that are no longer supported by the maintainer

5.3CVSS5.3AI score0.00232EPSS
CVE
CVE
added 2021/02/23 7:15 p.m.29 views

CVE-2021-26594

In Directus 8.x through 8.8.1, an attacker can switch to the administrator role (via the PATCH method) without any control by the back end. NOTE: This vulnerability only affects products that are no longer supported by the maintainer

8.8CVSS8.6AI score0.0031EPSS
CVE
CVE
added 2023/03/06 5:15 p.m.29 views

CVE-2023-27474

Directus is a real-time API and App dashboard for managing SQL database content. Instances relying on an allow-listed reset URL are vulnerable to an HTML injection attack through the use of query parameters in the reset URL. An attacker could exploit this to email users urls to the servers domain b...

8CVSS6.2AI score0.00557EPSS
CVE
CVE
added 2018/05/05 10:29 p.m.28 views

CVE-2018-10723

Directus 6.4.9 has a hardcoded admin password for the Admin account because of an INSERT statement in api/schema.sql.

9.8CVSS9.5AI score0.00482EPSS