Directus v10.13.0 allows an authenticated external attacker to modify presets created by the same user to assign them to another user. This is possible because the application only validates the user parameter in the 'POST /presets'Â request but not in the PATCH request. When chained with CVE-2024-6533, it could result in account takeover.
References
Link | Resource |
---|---|
https://directus.io/ | Product |
https://fluidattacks.com/advisories/capaldi | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2024-08-15 04:15
Updated : 2024-08-19 18:17
NVD link : CVE-2024-6534
Mitre link : CVE-2024-6534
CVE.ORG link : CVE-2024-6534
JSON object : View
Products Affected
monospace
- directus
CWE
CWE-639
Authorization Bypass Through User-Controlled Key