CVE-2024-6533

Directus v10.13.0 allows an authenticated external attacker to execute arbitrary JavaScript on the client. This is possible because the application injects an attacker-controlled parameter that will be stored in the server and used by the client into an unsanitized DOM element. When chained with CVE-2024-6534, it could result in account takeover.
References
Link Resource
https://directus.io/ Product
https://fluidattacks.com/advisories/bocelli Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:monospace:directus:10.13.0:*:*:*:*:*:*:*

History

19 Aug 2024, 18:13

Type Values Removed Values Added
CPE cpe:2.3:a:monospace:directus:10.13.0:*:*:*:*:*:*:*
References () https://directus.io/ - () https://directus.io/ - Product
References () https://fluidattacks.com/advisories/bocelli - () https://fluidattacks.com/advisories/bocelli - Exploit, Third Party Advisory
First Time Monospace
Monospace directus
Summary
  • (es) Directus v10.13.0 permite que un atacante externo autenticado ejecute JavaScript arbitrario en el cliente. Esto es posible porque la aplicación inyecta un parámetro controlado por el atacante que se almacenará en el servidor y será utilizado por el cliente en un elemento DOM no desinfectado. Cuando se encadena con CVE-2024-6534, podría resultar en una apropiación de la cuenta.
CVSS v2 : unknown
v3 : 4.1
v2 : unknown
v3 : 5.4

15 Aug 2024, 03:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-08-15 03:15

Updated : 2024-08-19 18:13


NVD link : CVE-2024-6533

Mitre link : CVE-2024-6533

CVE.ORG link : CVE-2024-6533


JSON object : View

Products Affected

monospace

  • directus
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')