CVE-2024-39896

Directus is a real-time API and App dashboard for managing SQL database content. When relying on SSO providers in combination with local authentication it can be possible to enumerate existing SSO users in the instance. This is possible because if an email address exists in Directus and belongs to a known SSO provider then it will throw a "helpful" error that the user belongs to another provider. This vulnerability is fixed in 10.13.0.
Configurations

Configuration 1 (hide)

cpe:2.3:a:monospace:directus:*:*:*:*:*:node.js:*:*

History

03 Jan 2025, 16:30

Type Values Removed Values Added
First Time Monospace
Monospace directus
References () https://github.com/directus/directus/commit/454cb534d6ffa547feb11f4d74b932ae7368dae2 - () https://github.com/directus/directus/commit/454cb534d6ffa547feb11f4d74b932ae7368dae2 - Patch
References () https://github.com/directus/directus/security/advisories/GHSA-jgf4-vwc3-r46v - () https://github.com/directus/directus/security/advisories/GHSA-jgf4-vwc3-r46v - Exploit, Vendor Advisory
CPE cpe:2.3:a:monospace:directus:*:*:*:*:*:node.js:*:*
CWE NVD-CWE-noinfo

Information

Published : 2024-07-08 18:15

Updated : 2025-01-03 16:30


NVD link : CVE-2024-39896

Mitre link : CVE-2024-39896

CVE.ORG link : CVE-2024-39896


JSON object : View

Products Affected

monospace

  • directus
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor

NVD-CWE-noinfo