Описание
Directus is a real-time API and App dashboard for managing SQL database content. Prior to 10.11.2, providing a non-numeric length value to the random string generation utility will create a memory issue breaking the capability to generate random strings platform wide. This creates a denial of service situation where logged in sessions can no longer be refreshed as sessions depend on the capability to generate a random session ID. This vulnerability is fixed in 10.11.2.
Ссылки
- Patch
- ExploitVendor Advisory
- Patch
- ExploitVendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 10.11.2 (исключая)
cpe:2.3:a:monospace:directus:*:*:*:*:*:node.js:*:*
EPSS
Процентиль: 64%
0.00461
Низкий
7.5 High
CVSS3
Дефекты
CWE-754
CWE-754
Связанные уязвимости
CVSS3: 7.5
github
больше 1 года назад
Directus is soft-locked by providing a string value to random string util
EPSS
Процентиль: 64%
0.00461
Низкий
7.5 High
CVSS3
Дефекты
CWE-754
CWE-754