Directus is a real-time API and App dashboard for managing SQL database content. Directus is vulnerable to Server-Side Request Forgery (SSRF) when importing a file from a remote web server (POST to `/files/import`). An attacker can bypass the security controls by performing a DNS rebinding attack and view sensitive data from internal servers or perform a local port scan. An attacker can exploit this vulnerability to access highly sensitive internal server(s) and steal sensitive information. This issue was fixed in version 9.23.0.
Metrics
Affected Vendors & Products
References
History
Tue, 25 Feb 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-02-25T15:02:38.689Z
Reserved: 2023-02-23T23:22:58.577Z
Link: CVE-2023-26492

Updated: 2024-08-02T11:53:53.737Z

Status : Modified
Published: 2023-03-03T22:15:09.987
Modified: 2024-11-21T07:51:37.847
Link: CVE-2023-26492

No data.