In Directus 8.x through 8.8.1, an attacker can see all users in the CMS using the API /users/{id}. For each call, they get in response a lot of information about the user (such as email address, first name, and last name) but also the secret for 2FA if one exists. This secret can be regenerated. NOTE: This vulnerability only affects products that are no longer supported by the maintainer
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://github.com/sgranel/directusv8 |
![]() ![]() |
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-03T20:26:25.469Z
Reserved: 2021-02-02T00:00:00
Link: CVE-2021-26593

No data.

Status : Modified
Published: 2021-02-23T19:15:13.713
Modified: 2024-11-21T05:56:32.617
Link: CVE-2021-26593

No data.