** UNSUPPORTED WHEN ASSIGNED ** In Directus 8.x through 8.8.1, an attacker can learn sensitive information such as the version of the CMS, the PHP version used by the site, and the name of the DBMS, simply by view the result of the api-aa, called automatically upon a connection. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
References
Link | Resource |
---|---|
https://github.com/sgranel/directusv8 | Exploit Third Party Advisory |
https://github.com/sgranel/directusv8 | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 05:56
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/sgranel/directusv8 - Exploit, Third Party Advisory |
Information
Published : 2021-02-23 19:15
Updated : 2024-11-21 05:56
NVD link : CVE-2021-26595
Mitre link : CVE-2021-26595
CVE.ORG link : CVE-2021-26595
JSON object : View
Products Affected
rangerstudio
- directus
CWE
CWE-312
Cleartext Storage of Sensitive Information