CVE-2023-38503Sensitive Information Exposure in Directus

Severity
6.5MEDIUMNVD
EPSS
0.1%
top 67.05%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJul 25

Description

Directus is a real-time API and App dashboard for managing SQL database content. Starting in version 10.3.0 and prior to version 10.5.0, the permission filters (i.e. `user_created IS $CURRENT_USER`) are not properly checked when using GraphQL subscription resulting in unauthorized users getting event on their subscription which they should not be receiving according to the permissions. This can be any collection but out-of-the box the `directus_users` collection is configured with such a permiss

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:NExploitability: 2.8 | Impact: 3.6

Affected Packages3 packages

npmdirectus/directus10.3.010.5.0
NVDmonospace/directus10.3.010.5.0
CVEListV5directus/directus>= 10.3.0, < 10.5.0

Patches

🔴Vulnerability Details

2
OSV
Incorrect Permission Checking for GraphQL Subscriptions2023-07-25
GHSA
Incorrect Permission Checking for GraphQL Subscriptions2023-07-25