Логотип exploitDog
bind:CVE-2023-27474
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-27474

Количество 2

Количество 2

nvd логотип

CVE-2023-27474

почти 3 года назад

Directus is a real-time API and App dashboard for managing SQL database content. Instances relying on an allow-listed reset URL are vulnerable to an HTML injection attack through the use of query parameters in the reset URL. An attacker could exploit this to email users urls to the servers domain but which may contain malicious code. The problem has been resolved and released under version 9.23.0. People relying on a custom password reset URL should upgrade to 9.23.0 or later, or remove the custom reset url from the configured allow list. Users are advised to upgrade. Users unable to upgrade may disable the custom reset URL allow list as a workaround.

CVSS3: 8
EPSS: Низкий
github логотип

GHSA-4hmq-ggrm-qfc6

почти 3 года назад

directus vulnerable to HTML Injection in Password Reset email to custom Reset URL

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-27474

Directus is a real-time API and App dashboard for managing SQL database content. Instances relying on an allow-listed reset URL are vulnerable to an HTML injection attack through the use of query parameters in the reset URL. An attacker could exploit this to email users urls to the servers domain but which may contain malicious code. The problem has been resolved and released under version 9.23.0. People relying on a custom password reset URL should upgrade to 9.23.0 or later, or remove the custom reset url from the configured allow list. Users are advised to upgrade. Users unable to upgrade may disable the custom reset URL allow list as a workaround.

CVSS3: 8
1%
Низкий
почти 3 года назад
github логотип
GHSA-4hmq-ggrm-qfc6

directus vulnerable to HTML Injection in Password Reset email to custom Reset URL

CVSS3: 7.5
1%
Низкий
почти 3 года назад

Уязвимостей на страницу