THREATINT

We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Fathom (Privacy friendly web analytics)
Zendesk (Helpdesk and Chat)

Ok

Home | EN
Support
CVE
PUBLISHED

CVE-2024-39699

Directus has a Blind SSRF On File Import

AssignerGitHub_M
Reserved2024-06-27
Published2024-07-08
Updated2024-07-08

Description

Directus is a real-time API and App dashboard for managing SQL database content. There was already a reported SSRF vulnerability via file import. It was fixed by resolving all DNS names and checking if the requested IP is an internal IP address. However it is possible to bypass this security measure and execute a SSRF using redirects. Directus allows redirects when importing file from the URL and does not check the result URL. Thus, it is possible to execute a request to an internal IP, for example to 127.0.0.1. However, it is blind SSRF, because Directus also uses response interception technique to get the information about the connect from the socket directly and it does not show a response if the IP address is internal. This vulnerability is fixed in 10.9.3.



MEDIUM: 5.0CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N

Problem types

CWE-918: Server-Side Request Forgery (SSRF)

Product status

< 10.9.3
affected

References

https://github.com/directus/directus/security/advisories/GHSA-8p72-rcq4-h6pw

https://github.com/directus/directus/commit/d577b44231c0923aca99cac5770fd853801caee1

cve.org CVE-2024-39699

nvd.nist.gov CVE-2024-39699

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-39699
© Copyright 2024 THREATINT. Made in Cyprus with +