Lucene search

K
veracodeVeracode Vulnerability DatabaseVERACODE:48477
HistoryAug 16, 2024 - 7:04 a.m.

Authorization Bypass

2024-08-1607:04:09
Veracode Vulnerability Database
sca.analysiscenter.veracode.com
3
directus
authorization bypass
validation missing
patch requests
presets
end point
authenticated
external attacker
modify
user parameter
software

CVSS3

4.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

AI Score

6.3

Confidence

Low

EPSS

0

Percentile

14.6%

directus is vulnerable to Authorization Bypass. The vulnerability is caused due to a missing validation for the user parameter in the PATCH requests for the end point /presets. This allows an authenticated external attacker to modify presets created by the same user to assign them to another user.

CVSS3

4.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

AI Score

6.3

Confidence

Low

EPSS

0

Percentile

14.6%