fkie_cve-2024-46990
Vulnerability from fkie_nvd
Published
2024-09-18 17:15
Modified
2024-09-20 12:30
Severity ?
Summary
Directus is a real-time API and App dashboard for managing SQL database content. When relying on blocking access to localhost using the default `0.0.0.0` filter a user may bypass this block by using other registered loopback devices (like `127.0.0.2` - `127.127.127.127`). This issue has been addressed in release versions 10.13.3 and 11.1.0. Users are advised to upgrade. Users unable to upgrade may block this bypass by manually adding the `127.0.0.0/8` CIDR range which will block access to any `127.X.X.X` ip instead of just `127.0.0.1`.
References
Impacted products
Vendor | Product | Version |
---|
{ "cveTags": [], "descriptions": [ { "lang": "en", "value": "Directus is a real-time API and App dashboard for managing SQL database content. When relying on blocking access to localhost using the default `0.0.0.0` filter a user may bypass this block by using other registered loopback devices (like `127.0.0.2` - `127.127.127.127`). This issue has been addressed in release versions 10.13.3 and 11.1.0. Users are advised to upgrade. Users unable to upgrade may block this bypass by manually adding the `127.0.0.0/8` CIDR range which will block access to any `127.X.X.X` ip instead of just `127.0.0.1`." }, { "lang": "es", "value": "Directus es una API en tiempo real y un panel de control de aplicaciones para administrar el contenido de la base de datos SQL. Cuando se conf\u00eda en bloquear el acceso al host local mediante el filtro predeterminado `0.0.0.0`, un usuario puede omitir este bloqueo mediante el uso de otros dispositivos de bucle invertido registrados (como `127.0.0.2` - `127.127.127.127`). Este problema se ha solucionado en las versiones de lanzamiento 10.13.3 y 11.1.0. Se recomienda a los usuarios que actualicen. Los usuarios que no puedan actualizar pueden bloquear esta omisi\u00f3n agregando manualmente el rango CIDR `127.0.0.0/8` que bloquear\u00e1 el acceso a cualquier IP `127.XXX` en lugar de solo `127.0.0.1`." } ], "id": "CVE-2024-46990", "lastModified": "2024-09-20T12:30:17.483", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.1, "impactScore": 1.4, "source": "security-advisories@github.com", "type": "Secondary" } ] }, "published": "2024-09-18T17:15:19.687", "references": [ { "source": "security-advisories@github.com", "url": "https://github.com/directus/directus/commit/4aace0bbe57232e38cd6a287ee475293e46dc91b" }, { "source": "security-advisories@github.com", "url": "https://github.com/directus/directus/commit/769fa22797bff5a9231599883b391e013f122e52" }, { "source": "security-advisories@github.com", "url": "https://github.com/directus/directus/commit/8cbf943b65fd4a763d09a5fdbba8996b1e7797ff" }, { "source": "security-advisories@github.com", "url": "https://github.com/directus/directus/commit/c1f3ccc681595038d094ce110ddeee38cb38f431" }, { "source": "security-advisories@github.com", "url": "https://github.com/directus/directus/security/advisories/GHSA-68g8-c275-xf2m" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Awaiting Analysis", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-284" } ], "source": "security-advisories@github.com", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.