We found results for “”
CVE-2022-23080
Date: June 22, 2022
Overview
In directus versions v9.0.0-beta.2 through 9.6.0 are vulnerable to server-side request forgery (SSRF) in the media upload functionality which allows a low privileged user to perform internal network port scans.Details
In directus versions v9.0.0-beta.2 through 9.6.0 are vulnerable to server-side request forgery (SSRF) in the media upload functionality which allows a low privileged user to perform internal network port scans. This vulnerability is possible as the application failed to validate the user input.PoC Details
1. Login to the application with a low privileged user.2. In a terminal start an nc listener.
3. Go to http://localhost:8055/admin/users and click on the user test profile.
4. Go to avatar > import file from URL and enter URL with port which is closed. Since the port is not open, it will error out.
5. This time, enter a URL with a port which is open. The server then will take time to respond and it will send a GET request to the internal port, confirming the port is alive.
Affected Environments
directus versions v9.0.0-beta.2 through 9.6.0Prevention
Upgrade to directus version v9.7.0Language: JS
Good to know:
Base Score: |
|
---|---|
Attack Vector (AV): | Network |
Attack Complexity (AC): | Low |
Privileges Required (PR): | Low |
User Interaction (UI): | None |
Scope (S): | Changed |
Confidentiality (C): | Low |
Integrity (I): | None |
Availability (A): | None |
Base Score: |
|
---|---|
Access Vector (AV): | Network |
Access Complexity (AC): | Low |
Authentication (AU): | Single |
Confidentiality (C): | Partial |
Integrity (I): | None |
Availability (A): | None |
Additional information: |