Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-2ccr-g2rv-h677

Опубликовано: 12 мар. 2024
Источник: github
Github: Прошло ревью
CVSS3: 2.3

Описание

Session Token in URL in directus

Impact

When reaching the /files page, a JWT is passed via GET request. Inclusion of session tokens in URLs poses a security risk as URLs are often logged in various places (e.g., web server logs, browser history). Attackers gaining access to these logs may hijack active user sessions, leading to unauthorized access to sensitive information or actions on behalf of the user.

Patches

Has the problem been patched? What versions should users upgrade to?

Workarounds

There's no workaround available.

References

Are there any links users can visit to find out more?

Пакеты

Наименование

directus

npm
Затронутые версииВерсия исправления

< 10.10.0

10.10.0

EPSS

Процентиль: 26%
0.00088
Низкий

2.3 Low

CVSS3

Дефекты

CWE-200
CWE-598

Связанные уязвимости

CVSS3: 2.3
nvd
почти 2 года назад

Directus is a real-time API and App dashboard for managing SQL database content. When reaching the /files page, a JWT is passed via GET request. Inclusion of session tokens in URLs poses a security risk as URLs are often logged in various places (e.g., web server logs, browser history). Attackers gaining access to these logs may hijack active user sessions, leading to unauthorized access to sensitive information or actions on behalf of the user. This issue has been addressed in version 10.10.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.

EPSS

Процентиль: 26%
0.00088
Низкий

2.3 Low

CVSS3

Дефекты

CWE-200
CWE-598