Описание
Directus vulnerable to SSRF Loopback IP filter bypass
Impact
If you're relying on blocking access to localhost using the default 0.0.0.0 filter this can be bypassed using other registered loopback devices (like 127.0.0.2 - 127.127.127.127)
Workaround
You can block this bypass by manually adding the 127.0.0.0/8 CIDR range which will block access to any 127.X.X.X ip instead of just 127.0.0.1.
Ссылки
- https://github.com/directus/directus/security/advisories/GHSA-68g8-c275-xf2m
- https://nvd.nist.gov/vuln/detail/CVE-2024-46990
- https://github.com/directus/directus/commit/4aace0bbe57232e38cd6a287ee475293e46dc91b
- https://github.com/directus/directus/commit/769fa22797bff5a9231599883b391e013f122e52
- https://github.com/directus/directus/commit/8cbf943b65fd4a763d09a5fdbba8996b1e7797ff
- https://github.com/directus/directus/commit/c1f3ccc681595038d094ce110ddeee38cb38f431
Пакеты
directus
< 10.13.3
10.13.3
directus
>= 11.0.0, < 11.1.0
11.1.0
@directus/api
< 21.0.0
21.0.0
@directus/api
>= 22.0.0, < 22.1.1
22.1.1
EPSS
5.3 Medium
CVSS4
5 Medium
CVSS3
CVE ID
Дефекты
Связанные уязвимости
Directus is a real-time API and App dashboard for managing SQL database content. When relying on blocking access to localhost using the default `0.0.0.0` filter a user may bypass this block by using other registered loopback devices (like `127.0.0.2` - `127.127.127.127`). This issue has been addressed in release versions 10.13.3 and 11.1.0. Users are advised to upgrade. Users unable to upgrade may block this bypass by manually adding the `127.0.0.0/8` CIDR range which will block access to any `127.X.X.X` ip instead of just `127.0.0.1`.
EPSS
5.3 Medium
CVSS4
5 Medium
CVSS3