Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-632p-p495-25m5

Опубликовано: 04 июн. 2024
Источник: github
Github: Прошло ревью
CVSS3: 7.5

Описание

Directus is soft-locked by providing a string value to random string util

Describe the Bug

Providing a non-numeric length value to the random string generation utility will create a memory issue breaking the capability to generate random strings platform wide. This creates a denial of service situation where logged in sessions can no longer be refreshed as sessions depend on the capability to generate a random session ID.

To Reproduce

  1. Test if the endpoint is working and accessible, GET http://localhost:8055/utils/random/string
  2. Do a bad request GET http://localhost:8055/utils/random/string?length=foo
  3. After this all calls to GET http://localhost:8055/utils/random/string will return an empty string instead of a random string
  4. In this error situation you'll see authentication refreshes fail for the app and api.

Impact

This counts as an unauthenticated denial of service attack vector so this impacts all unpatched instances reachable over the internet.

Пакеты

Наименование

directus

npm
Затронутые версииВерсия исправления

<= 10.11.1

10.11.2

EPSS

Процентиль: 64%
0.00461
Низкий

7.5 High

CVSS3

Дефекты

CWE-754

Связанные уязвимости

CVSS3: 7.5
nvd
больше 1 года назад

Directus is a real-time API and App dashboard for managing SQL database content. Prior to 10.11.2, providing a non-numeric length value to the random string generation utility will create a memory issue breaking the capability to generate random strings platform wide. This creates a denial of service situation where logged in sessions can no longer be refreshed as sessions depend on the capability to generate a random session ID. This vulnerability is fixed in 10.11.2.

EPSS

Процентиль: 64%
0.00461
Низкий

7.5 High

CVSS3

Дефекты

CWE-754