Rangerstudio

Directus 7 Api

5 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 1.08%
  • Veröffentlicht 19.07.2019 15:15:12
  • Zuletzt bearbeitet 21.11.2024 04:25:49

In Directus 7 API before 2.2.1, uploading of PHP files is not blocked, leading to uploads/_/originals remote code execution.

Exploit
  • EPSS 1.05%
  • Veröffentlicht 19.07.2019 15:15:12
  • Zuletzt bearbeitet 21.11.2024 04:25:49

In Directus 7 API through 2.3.0, uploading of PHP files is blocked only when the Apache HTTP Server is used, leading to uploads/_/originals remote code execution with nginx.

Exploit
  • EPSS 0.42%
  • Veröffentlicht 19.07.2019 15:15:12
  • Zuletzt bearbeitet 21.11.2024 04:25:49

In Directus 7 API through 2.3.0, remote attackers can read image files via a direct request for a filename under the uploads/_/originals/ directory. This is related to a configuration option in which the file collection can be non-public, but this op...

  • EPSS 0.26%
  • Veröffentlicht 19.07.2019 15:15:12
  • Zuletzt bearbeitet 21.11.2024 04:25:49

Directus 7 API before 2.2.2 has insufficient anti-automation, as demonstrated by lack of a CAPTCHA in core/Directus/Services/AuthService.php and endpoints/Auth.php.

Exploit
  • EPSS 2.55%
  • Veröffentlicht 19.07.2019 15:15:12
  • Zuletzt bearbeitet 21.11.2024 04:25:50

Directus 7 API before 2.3.0 does not validate uploaded files. Regardless of the file extension or MIME type, there is a direct link to each uploaded file, accessible by unauthenticated users, as demonstrated by the EICAR Anti-Virus Test File.