Описание
Directus is a real-time API and App dashboard for managing SQL database content. Prior to 10.11.0, session tokens function like the other JWT tokens where they are not actually invalidated when logging out. The directus_session gets destroyed and the cookie gets deleted but if the cookie value is captured, it will still work for the entire expiry time which is set to 1 day by default. Making it effectively a long lived unrevokable stateless token instead of the stateful session token it was meant to be. This vulnerability is fixed in 10.11.0.
Ссылки
- Patch
- ExploitVendor Advisory
- Patch
- ExploitVendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 10.11.0 (исключая)
cpe:2.3:a:monospace:directus:*:*:*:*:*:node.js:*:*
EPSS
Процентиль: 45%
0.00226
Низкий
5.4 Medium
CVSS3
Дефекты
CWE-613
CWE-613
Связанные уязвимости
EPSS
Процентиль: 45%
0.00226
Низкий
5.4 Medium
CVSS3
Дефекты
CWE-613
CWE-613