CVE-2023-27481Sensitive Information Exposure in Directus

Severity
4.3MEDIUMNVD
EPSS
0.3%
top 46.54%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMar 7
Latest updateMar 8

Description

Directus is a real-time API and App dashboard for managing SQL database content. In versions prior to 9.16.0 users with read access to the `password` field in `directus_users` can extract the argon2 password hashes by brute forcing the export functionality combined with a `_starts_with` filter. This allows the user to enumerate the password hashes. Accounts cannot be taken over unless the hashes can be reversed which is unlikely with current hardware. This problem has been patched by preventing

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:NExploitability: 2.8 | Impact: 1.4

Affected Packages3 packages

CVEListV5directus/directus< 9.16.0
npmdirectus/directus< 9.16.0
NVDmonospace/directus< 9.16.0

Patches

🔴Vulnerability Details

2
OSV
Directus vulnerable to extraction of password hashes through export querying2023-03-08
GHSA
Directus vulnerable to extraction of password hashes through export querying2023-03-08