Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-56p6-qw3c-fq2g

Опубликовано: 26 мар. 2025
Источник: github
Github: Прошло ревью
CVSS3: 3.5

Описание

Suspended Directus user can continue to use session token to access API

Summary

Since the user status is not checked when verifying a session token a suspended user can use the token generated in session auth mode to access the API despite their status.

Details

There is a check missing in verifySessionJWT to verify that a user is actually still active and allowed to access the API. Right now one can extract the session token obtained by, e.g. login in to the app while still active and then, after the user has been suspended continue to use that token until it expires.

PoC

  • Create an active user
  • Log in with that user and note the session cookie
  • Suspend the user (and don't trigger an /auth/refresh call, as that invalidates the session
  • Access the API with Authorization: Bearer <token>

Impact

This weakens the security of suspending users.

Пакеты

Наименование

directus

npm
Затронутые версииВерсия исправления

>= 10.10.0, < 11.5.0

11.5.0

Наименование

@directus/api

npm
Затронутые версииВерсия исправления

>= 18.0.0, < 24.0.1

24.0.1

Наименование

@directus/types

npm
Затронутые версииВерсия исправления

>= 11.0.7, < 13.0.0

13.0.0

EPSS

Процентиль: 46%
0.0023
Низкий

3.5 Low

CVSS3

Дефекты

CWE-672

Связанные уязвимости

CVSS3: 3.5
nvd
11 месяцев назад

Directus is a real-time API and App dashboard for managing SQL database content. Starting in version 10.10.0 and prior to version 11.5.0, a suspended user can use the token generated in session auth mode to access the API despite their status. This happens because there is a check missing in `verifySessionJWT` to verify that a user is actually still active and allowed to access the API. One can extract the session token obtained by, e.g. login in to the app while still active and then, after the user has been suspended continue to use that token until it expires. Version 11.5.0 patches the issue.

EPSS

Процентиль: 46%
0.0023
Низкий

3.5 Low

CVSS3

Дефекты

CWE-672