GHSA-m5q3-8wgf-x8xf

Suggest an improvement
Source
https://github.com/advisories/GHSA-m5q3-8wgf-x8xf
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/03/GHSA-m5q3-8wgf-x8xf/GHSA-m5q3-8wgf-x8xf.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-m5q3-8wgf-x8xf
Aliases
Published
2023-03-08T17:13:05Z
Modified
2023-11-08T04:12:04.728702Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N CVSS Calculator
Summary
Directus vulnerable to extraction of password hashes through export querying
Details

Impact

Users with read access to the password field in directus_users can extract the argon2 password hashes by brute forcing the export functionality combined with a _starts_with filter. This allows the user to enumerate the password hashes.

Patches

The problem has been patched by preventing any hashed/concealed field to be filtered against with the _starts_with or other string operator.

Workarounds

Ensuring that no user has read access to the password field in directus_users is sufficient to prevent this vulnerability.

For more information

If you have any questions or comments about this advisory: * Open a Discussion in directus/directus * Email us at security@directus.io

References

Affected packages

npm / directus

Package

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
9.16.0