CVE-2024-27296

Directus is a real-time API and App dashboard for managing SQL database content. Prior to version 10.8.3, the exact Directus version number was being shipped in compiled JS bundles which are accessible without authentication. With this information a malicious attacker can trivially look for known vulnerabilities in Directus core or any of its shipped dependencies in that specific running version. The problem has been resolved in versions 10.8.3 and newer.
Configurations

Configuration 1 (hide)

cpe:2.3:a:monospace:directus:*:*:*:*:*:node.js:*:*

History

03 Jan 2025, 16:14

Type Values Removed Values Added
CPE cpe:2.3:a:monospace:directus:*:*:*:*:*:node.js:*:*
First Time Monospace
Monospace directus
References () https://github.com/directus/directus/commit/a5a1c26ac48795ed3212a4c51b9523588aff4fa0 - () https://github.com/directus/directus/commit/a5a1c26ac48795ed3212a4c51b9523588aff4fa0 - Patch
References () https://github.com/directus/directus/security/advisories/GHSA-5mhg-wv8w-p59j - () https://github.com/directus/directus/security/advisories/GHSA-5mhg-wv8w-p59j - Vendor Advisory
CWE NVD-CWE-noinfo

Information

Published : 2024-03-01 16:15

Updated : 2025-01-03 16:14


NVD link : CVE-2024-27296

Mitre link : CVE-2024-27296

CVE.ORG link : CVE-2024-27296


JSON object : View

Products Affected

monospace

  • directus
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor

NVD-CWE-noinfo