icon

We found results for “

CVE-2022-23080

Date: June 22, 2022

Overview

In directus versions v9.0.0-beta.2 through 9.6.0 are vulnerable to server-side request forgery (SSRF) in the media upload functionality which allows a low privileged user to perform internal network port scans.

Details

In directus versions v9.0.0-beta.2 through 9.6.0 are vulnerable to server-side request forgery (SSRF) in the media upload functionality which allows a low privileged user to perform internal network port scans. This vulnerability is possible as the application failed to validate the user input.

PoC Details

1. Login to the application with a low privileged user.
2. In a terminal start an nc listener.
3. Go to http://localhost:8055/admin/users and click on the user test profile.
4. Go to avatar > import file from URL and enter URL with port which is closed. Since the port is not open, it will error out.
5. This time, enter a URL with a port which is open. The server then will take time to respond and it will send a GET request to the internal port, confirming the port is alive.

Affected Environments

directus versions v9.0.0-beta.2 through 9.6.0

Prevention

Upgrade to directus version v9.7.0

Language: JS

Good to know:

icon
icon

Server-Side Request Forgery (SSRF)

CWE-918
icon

Upgrade Version

Upgrade to version directus - 9.7.0

Learn More

Base Score:
Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): Low
User Interaction (UI): None
Scope (S): Changed
Confidentiality (C): Low
Integrity (I): None
Availability (A): None
Base Score:
Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (AU): Single
Confidentiality (C): Partial
Integrity (I): None
Availability (A): None
Additional information: