CVE-2024-39896

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-39896
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-39896.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-39896
Aliases
Published
2024-07-08T17:27:56Z
Modified
2025-10-22T18:43:11.860769Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
Directus allows SSO User Enumeration
Details

Directus is a real-time API and App dashboard for managing SQL database content. When relying on SSO providers in combination with local authentication it can be possible to enumerate existing SSO users in the instance. This is possible because if an email address exists in Directus and belongs to a known SSO provider then it will throw a "helpful" error that the user belongs to another provider. This vulnerability is fixed in 10.13.0.

Database specific
{
    "cwe_ids": [
        "CWE-200"
    ]
}
References

Affected packages

Git / github.com/directus/directus

Affected ranges

Type
GIT
Repo
https://github.com/directus/directus
Events

Affected versions

10.*

10.11.2

v10.*

v10.0.0
v10.1.0
v10.1.1
v10.10.0
v10.10.1
v10.10.2
v10.10.3
v10.10.4
v10.10.5
v10.10.6
v10.10.7
v10.11.0
v10.11.1
v10.11.2
v10.12.1
v10.2.0
v10.2.1
v10.3.0
v10.4.0
v10.4.2
v10.4.3
v10.5.0
v10.5.1
v10.5.2
v10.5.3
v10.6.0
v10.6.1
v10.6.2
v10.6.3
v10.6.4
v10.7.0
v10.7.1
v10.7.2
v10.8.0
v10.8.1
v10.8.2
v10.8.3
v10.9.0
v10.9.1
v10.9.2
v10.9.3

v9.*

v9.11.0
v9.11.1
v9.12.0
v9.12.1
v9.12.2
v9.13.0
v9.14.1
v9.14.2
v9.14.3
v9.14.4
v9.14.5
v9.15.0
v9.15.1
v9.16.0
v9.16.1
v9.17.0
v9.17.1
v9.17.2
v9.17.3
v9.17.4
v9.18.0
v9.18.1
v9.19.0
v9.19.1
v9.19.2
v9.20.0
v9.20.1
v9.20.2
v9.20.3
v9.20.4
v9.21.0
v9.21.1
v9.21.2
v9.22.0
v9.22.1
v9.22.2
v9.22.3
v9.22.4
v9.23.0
v9.23.1
v9.23.2
v9.23.3
v9.23.4
v9.24.0
v9.25.0
v9.25.1
v9.25.2
v9.26.0