Описание
Directus is a real-time API and App dashboard for managing SQL database content. When relying on blocking access to localhost using the default 0.0.0.0 filter a user may bypass this block by using other registered loopback devices (like 127.0.0.2 - 127.127.127.127). This issue has been addressed in release versions 10.13.3 and 11.1.0. Users are advised to upgrade. Users unable to upgrade may block this bypass by manually adding the 127.0.0.0/8 CIDR range which will block access to any 127.X.X.X ip instead of just 127.0.0.1.
Ссылки
- Patch
- Patch
- Patch
- Patch
- MitigationVendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 10.13.3 (исключая)Версия от 11.0.0 (включая) до 11.1.0 (исключая)
Одно из
cpe:2.3:a:monospace:directus:*:*:*:*:*:node.js:*:*
cpe:2.3:a:monospace:directus:*:*:*:*:*:node.js:*:*
EPSS
Процентиль: 33%
0.00128
Низкий
5 Medium
CVSS3
Дефекты
CWE-284
CWE-918
Связанные уязвимости
CVSS3: 5
github
больше 1 года назад
Directus vulnerable to SSRF Loopback IP filter bypass
EPSS
Процентиль: 33%
0.00128
Низкий
5 Medium
CVSS3
Дефекты
CWE-284
CWE-918