Directus 8 before 8.8.2 allows remote authenticated users to execute arbitrary code because file-upload permissions include the ability to upload a .php file to the main upload directory and/or upload a .php file and a .htaccess file to a subdirectory. Exploitation succeeds only for certain installations with the Apache HTTP Server and the local-storage driver (e.g., when the product was obtained from hub.docker.com).
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-03T22:11:06.112Z
Reserved: 2021-03-30T00:00:00
Link: CVE-2021-29641

No data.

Status : Modified
Published: 2021-04-07T22:15:14.973
Modified: 2024-11-21T06:01:32.443
Link: CVE-2021-29641

No data.