Логотип exploitDog
bind:CVE-2023-26492
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-26492

Количество 2

Количество 2

nvd логотип

CVE-2023-26492

почти 3 года назад

Directus is a real-time API and App dashboard for managing SQL database content. Directus is vulnerable to Server-Side Request Forgery (SSRF) when importing a file from a remote web server (POST to `/files/import`). An attacker can bypass the security controls by performing a DNS rebinding attack and view sensitive data from internal servers or perform a local port scan. An attacker can exploit this vulnerability to access highly sensitive internal server(s) and steal sensitive information. This issue was fixed in version 9.23.0.

CVSS3: 5
EPSS: Низкий
github логотип

GHSA-j3rg-3rgm-537h

почти 3 года назад

Directus vulnerable to Server-Side Request Forgery On File Import

CVSS3: 5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-26492

Directus is a real-time API and App dashboard for managing SQL database content. Directus is vulnerable to Server-Side Request Forgery (SSRF) when importing a file from a remote web server (POST to `/files/import`). An attacker can bypass the security controls by performing a DNS rebinding attack and view sensitive data from internal servers or perform a local port scan. An attacker can exploit this vulnerability to access highly sensitive internal server(s) and steal sensitive information. This issue was fixed in version 9.23.0.

CVSS3: 5
0%
Низкий
почти 3 года назад
github логотип
GHSA-j3rg-3rgm-537h

Directus vulnerable to Server-Side Request Forgery On File Import

CVSS3: 5
0%
Низкий
почти 3 года назад

Уязвимостей на страницу