We found results for “”
CVE-2022-23080
Date: June 22, 2022
Overview
In directus versions v9.0.0-beta.2 through 9.6.0 are vulnerable to server-side request forgery (SSRF) in the media upload functionality which allows a low privileged user to perform internal network port scans.Details
In directus versions v9.0.0-beta.2 through 9.6.0 are vulnerable to server-side request forgery (SSRF) in the media upload functionality which allows a low privileged user to perform internal network port scans. This vulnerability is possible as the application failed to validate the user input.PoC Details
1. Login to the application with a low privileged user.2. In a terminal start an nc listener.
3. Go to http://localhost:8055/admin/users and click on the user test profile.
4. Go to avatar > import file from URL and enter URL with port which is closed. Since the port is not open, it will error out.
5. This time, enter a URL with a port which is open. The server then will take time to respond and it will send a GET request to the internal port, confirming the port is alive.
Affected Environments
directus versions v9.0.0-beta.2 through 9.6.0Prevention
Upgrade to directus version v9.7.0Language: JS
Good to know:
| Base Score: |
|
|---|---|
| Attack Vector (AV): | Network |
| Attack Complexity (AC): | Low |
| Privileges Required (PR): | Low |
| User Interaction (UI): | None |
| Scope (S): | Changed |
| Confidentiality (C): | Low |
| Integrity (I): | None |
| Availability (A): | None |
| Base Score: |
|
|---|---|
| Access Vector (AV): | Network |
| Access Complexity (AC): | Low |
| Authentication (AU): | Single |
| Confidentiality (C): | Partial |
| Integrity (I): | None |
| Availability (A): | None |
| Additional information: |
Vulnerabilities
Projects
Contact Us


