Описание
In Directus 7 API through 2.3.0, remote attackers can read image files via a direct request for a filename under the uploads/_/originals/ directory. This is related to a configuration option in which the file collection can be non-public, but this option does not apply to the thumbnailer.
Ссылки
- ExploitIssue TrackingThird Party Advisory
- Issue TrackingThird Party Advisory
- ExploitIssue TrackingThird Party Advisory
- Issue TrackingThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 2.3.0 (включая)
cpe:2.3:a:rangerstudio:directus_7_api:*:*:*:*:*:*:*:*
EPSS
Процентиль: 62%
0.00423
Низкий
5.3 Medium
CVSS3
5 Medium
CVSS2
Дефекты
CWE-425
Связанные уязвимости
CVSS3: 5.3
github
больше 3 лет назад
In Directus 7 API through 2.3.0, remote attackers can read image files via a direct request for a filename under the uploads/_/originals/ directory. This is related to a configuration option in which the file collection can be non-public, but this option does not apply to the thumbnailer.
EPSS
Процентиль: 62%
0.00423
Низкий
5.3 Medium
CVSS3
5 Medium
CVSS2
Дефекты
CWE-425