Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1wOHYzLW02NDMtNHhxeM4AA74s
Directus allows redacted data extraction on the API through "alias"
Summary
A user with permission to view any collection using redacted hashed fields can get access the raw stored version using the alias
functionality on the API.
Normally, these redacted fields will return **********
however if we change the request to ?alias[workaround]=redacted
we can instead retrieve the plain text value for the field.
Steps to reproduce
- Set up a simple role with read-access to users.
- Create a new user with the role from the previous step
- Assign a password to the user
The easiest way to confirm this vulnerability is by first visiting /users/me
. You should be presented with a redacted JSON-object.
Next, visit /users/me?alias[hash]=password
. This time, the returned JSON object will included the raw password hash instead of the redacted value.
Workaround
This can be avoided by removing permission to view the sensitive fields entirely from users or roles that should not be able to see them.
Permalink: https://github.com/advisories/GHSA-p8v3-m643-4xqxJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1wOHYzLW02NDMtNHhxeM4AA74s
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: 8 months ago
Updated: 8 months ago
CVSS Score: 4.9
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
EPSS Percentage: 0.00053
EPSS Percentile: 0.23215
Identifiers: GHSA-p8v3-m643-4xqx, CVE-2024-34708
References:
- https://github.com/directus/directus/security/advisories/GHSA-p8v3-m643-4xqx
- https://github.com/directus/directus/commit/e70a90c267bea695afce6545174c2b77517d617b
- https://nvd.nist.gov/vuln/detail/CVE-2024-34708
- https://github.com/advisories/GHSA-p8v3-m643-4xqx
Blast Radius: 10.1
Affected Packages
npm:directus
Dependent packages: 16Dependent repositories: 115
Downloads: 29,409 last month
Affected Version Ranges: < 10.11.0
Fixed in: 10.11.0
All affected versions: 9.0.0, 9.0.1, 9.1.0, 9.1.1, 9.1.2, 9.2.0, 9.2.1, 9.2.2, 9.3.0, 9.4.0, 9.4.1, 9.4.2, 9.4.3, 9.5.0, 9.5.1, 9.5.2, 9.6.0, 9.7.0, 9.7.1, 9.8.0, 9.9.0, 9.9.1, 9.10.0, 9.11.0, 9.11.1, 9.12.0, 9.12.1, 9.12.2, 9.13.0, 9.14.0, 9.14.1, 9.14.2, 9.14.3, 9.14.5, 9.15.0, 9.15.1, 9.16.0, 9.16.1, 9.17.0, 9.17.1, 9.17.2, 9.17.3, 9.17.4, 9.18.0, 9.18.1, 9.19.0, 9.19.1, 9.19.2, 9.20.0, 9.20.1, 9.20.2, 9.20.3, 9.20.4, 9.21.0, 9.21.2, 9.22.0, 9.22.1, 9.22.3, 9.22.4, 9.23.1, 9.23.3, 9.23.4, 9.24.0, 9.25.0, 9.25.1, 9.25.2, 9.26.0, 10.0.0, 10.1.0, 10.1.1, 10.2.0, 10.2.1, 10.3.0, 10.3.1, 10.4.1, 10.4.2, 10.4.3, 10.5.0, 10.5.1, 10.5.2, 10.5.3, 10.6.0, 10.6.1, 10.6.2, 10.6.3, 10.6.4, 10.7.0, 10.7.1, 10.7.2, 10.8.0, 10.8.1, 10.8.2, 10.8.3, 10.9.0, 10.9.1, 10.9.2, 10.9.3, 10.10.0, 10.10.1, 10.10.2, 10.10.3, 10.10.4, 10.10.5, 10.10.6, 10.10.7
All unaffected versions: 10.11.0, 10.11.1, 10.11.2, 10.12.0, 10.12.1, 10.13.0, 10.13.1, 10.13.2, 10.13.4, 11.0.0, 11.0.1, 11.0.2, 11.1.0, 11.1.1, 11.1.2, 11.2.0, 11.2.1, 11.2.2, 11.3.0, 11.3.1, 11.3.2, 11.3.3, 11.3.4, 11.3.5