Directus 8 before 8.8.2 allows remote authenticated users to execute arbitrary code because file-upload permissions include the ability to upload a .php file to the main upload directory and/or upload a .php file and a .htaccess file to a subdirectory. Exploitation succeeds only for certain installations with the Apache HTTP Server and the local-storage driver (e.g., when the product was obtained from hub.docker.com).
                
            Metrics
Affected Vendors & Products
References
        History
                    Mon, 14 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | 
        
        
        epss
         
  | 
    
        
        
        epss
         
  | 
Status: PUBLISHED
Assigner: mitre
Published: 2021-04-07T21:31:45
Updated: 2024-08-03T22:11:06.112Z
Reserved: 2021-03-30T00:00:00
Link: CVE-2021-29641
No data.
Status : Modified
Published: 2021-04-07T22:15:14.973
Modified: 2024-11-21T06:01:32.443
Link: CVE-2021-29641
No data.
ReportizFlow