Directus v10.13.0 allows an authenticated external attacker to execute arbitrary JavaScript on the client. This is possible because the application injects an attacker-controlled parameter that will be stored in the server and used by the client into an unsanitized DOM element. When chained with CVE-2024-6534, it could result in account takeover.
History

Mon, 19 Aug 2024 18:30:00 +0000

Type Values Removed Values Added
First Time appeared Monospace
Monospace directus
CPEs cpe:2.3:a:monospace:directus:10.13.0:*:*:*:*:*:*:*
Vendors & Products Monospace
Monospace directus

Fri, 16 Aug 2024 18:30:00 +0000

Type Values Removed Values Added
First Time appeared Directus
Directus directus
CPEs cpe:2.3:a:directus:directus:*:*:*:*:*:*:*:*
Vendors & Products Directus
Directus directus
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 15 Aug 2024 03:15:00 +0000

Type Values Removed Values Added
Description Directus v10.13.0 allows an authenticated external attacker to execute arbitrary JavaScript on the client. This is possible because the application injects an attacker-controlled parameter that will be stored in the server and used by the client into an unsanitized DOM element. When chained with CVE-2024-6534, it could result in account takeover.
Title Directus 10.13.0 - DOM-Based cross-site scripting (XSS) via layout_options
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 4.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Fluid Attacks

Published: 2024-08-15T03:04:08.250Z

Updated: 2024-08-16T17:31:53.765Z

Reserved: 2024-07-05T14:42:08.072Z

Link: CVE-2024-6533

cve-icon Vulnrichment

Updated: 2024-08-16T17:31:46.952Z

cve-icon NVD

Status : Analyzed

Published: 2024-08-15T03:15:04.567

Modified: 2024-08-19T18:13:59.457

Link: CVE-2024-6533

cve-icon Redhat

No data.