Directus vulnerable to unhandled exception on illegal filename_disk value
Moderate severity
GitHub Reviewed
Published
Aug 19, 2022
in
directus/directus
•
Updated Jan 28, 2023
Description
Published by the National Vulnerability Database
Aug 19, 2022
Published to the GitHub Advisory Database
Aug 30, 2022
Reviewed
Aug 30, 2022
Last updated
Jan 28, 2023
The Directus process can be aborted by having an authorized user update the
filename_disk
value to a folder and accessing that file through the/assets
endpoint.The vulnerability is patched and released in v9.15.0.
You can prevent this problem by making sure no (untrusted) non-admin users have permissions to update the
filename_disk
field ondirectus_files
.For more information
If you have any questions or comments about this advisory:
Credits
This vulnerability was first discovered and reported by Witold Gorecki.
References