Directus is a real-time API and App dashboard for managing SQL database content. Starting in version 11.0.0 and prior to version 11.3.0, when setting `WEBSOCKETS_GRAPHQL_AUTH` or `WEBSOCKETS_REST_AUTH` to "public", an unauthenticated user is able to do any of the supported operations (CRUD, subscriptions) with full admin privileges. This impacts any Directus instance that has either `WEBSOCKETS_GRAPHQL_AUTH` or `WEBSOCKETS_REST_AUTH` set to `public` allowing unauthenticated users to subscribe for changes on any collection or do REST CRUD operations on user defined collections ignoring permissions. Version 11.3.0 fixes the issue.
References
Configurations
No configuration.
History
10 Dec 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/directus/directus/security/advisories/GHSA-849r-qrwj-8rv4 - | |
Summary |
|
09 Dec 2024, 21:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-12-09 21:15
Updated : 2024-12-10 18:15
NVD link : CVE-2024-54151
Mitre link : CVE-2024-54151
CVE.ORG link : CVE-2024-54151
JSON object : View
Products Affected
No product.
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor