Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-1043 | Directus is a real-time API and App dashboard for managing SQL database content. Directus is vulnerable to Server-Side Request Forgery (SSRF) when importing a file from a remote web server (POST to `/files/import`). An attacker can bypass the security controls by performing a DNS rebinding attack and view sensitive data from internal servers or perform a local port scan. An attacker can exploit this vulnerability to access highly sensitive internal server(s) and steal sensitive information. This issue was fixed in version 9.23.0. |
Github GHSA |
GHSA-j3rg-3rgm-537h | Directus vulnerable to Server-Side Request Forgery On File Import |
Tue, 25 Feb 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-02-25T15:02:38.689Z
Reserved: 2023-02-23T23:22:58.577Z
Link: CVE-2023-26492
Updated: 2024-08-02T11:53:53.737Z
Status : Modified
Published: 2023-03-03T22:15:09.987
Modified: 2024-11-21T07:51:37.847
Link: CVE-2023-26492
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA