Directus v10.13.0 allows an authenticated external attacker to execute arbitrary JavaScript on the client. This is possible because the application injects an attacker-controlled parameter that will be stored in the server and used by the client into an unsanitized DOM element. When chained with CVE-2024-6534, it could result in account takeover.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://directus.io/ | |
https://fluidattacks.com/advisories/bocelli |
History
Mon, 19 Aug 2024 18:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Monospace
Monospace directus |
|
CPEs | cpe:2.3:a:monospace:directus:10.13.0:*:*:*:*:*:*:* | |
Vendors & Products |
Monospace
Monospace directus |
Fri, 16 Aug 2024 18:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Directus
Directus directus |
|
CPEs | cpe:2.3:a:directus:directus:*:*:*:*:*:*:*:* | |
Vendors & Products |
Directus
Directus directus |
|
Metrics |
ssvc
|
Thu, 15 Aug 2024 03:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Directus v10.13.0 allows an authenticated external attacker to execute arbitrary JavaScript on the client. This is possible because the application injects an attacker-controlled parameter that will be stored in the server and used by the client into an unsanitized DOM element. When chained with CVE-2024-6534, it could result in account takeover. | |
Title | Directus 10.13.0 - DOM-Based cross-site scripting (XSS) via layout_options | |
Weaknesses | CWE-79 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: Fluid Attacks
Published: 2024-08-15T03:04:08.250Z
Updated: 2024-08-16T17:31:53.765Z
Reserved: 2024-07-05T14:42:08.072Z
Link: CVE-2024-6533
Vulnrichment
Updated: 2024-08-16T17:31:46.952Z
NVD
Status : Analyzed
Published: 2024-08-15T03:15:04.567
Modified: 2024-08-19T18:13:59.457
Link: CVE-2024-6533
Redhat
No data.