Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-vw58-ph65-6rxp

Опубликовано: 14 апр. 2025
Источник: github
Github: Прошло ревью
CVSS3: 4.2

Описание

Directus inserts access token from query string into logs

Summary

Access token from query string is not redacted and is potentially exposed in system logs which may be persisted.

Details

The access token in req.query is not redacted when the LOG_STYLE is set to raw. If these logs are not properly sanitized or protected, an attacker with access to it can potentially gain administrative control, leading to unauthorized data access and manipulation.

PoC

  1. Set LOG_LEVEL="raw" in the environment.
  2. Send a request with the access_token in the query string.
  3. Notice that the access_token in req.query is not redacted.

Impact

It impacts systems where the LOG_STYLE is set to raw. The access_token in the query could potentially be a long-lived static token. Users with impacted systems should rotate their static tokens if they were provided using query string.

Пакеты

Наименование

@directus/api

npm
Затронутые версииВерсия исправления

< 21.0.0

21.0.0

EPSS

Процентиль: 20%
0.00063
Низкий

4.2 Medium

CVSS3

Дефекты

CWE-532

Связанные уязвимости

CVSS3: 4.2
nvd
больше 1 года назад

Directus is a real-time API and App dashboard for managing SQL database content. Access tokens from query strings are not redacted and are potentially exposed in system logs which may be persisted. The access token in `req.query` is not redacted when the `LOG_STYLE` is set to `raw`. If these logs are not properly sanitized or protected, an attacker with access to it can potentially gain administrative control, leading to unauthorized data access and manipulation. This impacts systems where the `LOG_STYLE` is set to `raw`. The `access_token` in the query could potentially be a long-lived static token. Users with impacted systems should rotate their static tokens if they were provided using query string. This vulnerability has been patched in release version 10.13.2 and subsequent releases as well. Users are advised to upgrade. There are no known workarounds for this vulnerability.

EPSS

Процентиль: 20%
0.00063
Низкий

4.2 Medium

CVSS3

Дефекты

CWE-532