Vulnerabilities
Vulnerable Software
Monospace:  >> Directus  >> 2.2.0  Security Vulnerabilities
Directus is a real-time API and App dashboard for managing SQL database content. There was already a reported SSRF vulnerability via file import. It was fixed by resolving all DNS names and checking if the requested IP is an internal IP address. However it is possible to bypass this security measure and execute a SSRF using redirects. Directus allows redirects when importing file from the URL and does not check the result URL. Thus, it is possible to execute a request to an internal IP, for example to 127.0.0.1. However, it is blind SSRF, because Directus also uses response interception technique to get the information about the connect from the socket directly and it does not show a response if the IP address is internal. This vulnerability is fixed in 10.9.3.
CVSS Score
5.0
EPSS Score
0.0
Published
2024-07-08
An issue found in Directus API v.2.2.0 allows a remote attacker to cause a denial of service via a great amount of HTTP requests.
CVSS Score
6.5
EPSS Score
0.002
Published
2023-04-04
In Directus before 9.7.0, the default settings of CORS_ORIGIN and CORS_ENABLED are true.
CVSS Score
9.8
EPSS Score
0.001
Published
2022-12-26
Directus is a free and open-source data platform for headless content management. The Directus process can be aborted by having an authorized user update the `filename_disk` value to a folder and accessing that file through the `/assets` endpoint. This vulnerability has been patched and release v9.15.0 contains the fix. Users are advised to upgrade. Users unable to upgrade may prevent this problem by making sure no (untrusted) non-admin users have permissions to update the `filename_disk` field on `directus_files`.
CVSS Score
6.5
EPSS Score
0.001
Published
2022-08-19


Contact Us

Shodan ® - All rights reserved