Description
Directus is a real-time API and App dashboard for managing SQL database content. Directus is vulnerable to Server-Side Request Forgery (SSRF) when importing a file from a remote web server (POST to `/files/import`). An attacker can bypass the security controls by performing a DNS rebinding attack and view sensitive data from internal servers or perform a local port scan. An attacker can exploit this vulnerability to access highly sensitive internal server(s) and steal sensitive information. This issue was fixed in version 9.23.0.
Remediation
References
https://github.com/directus/directus/commit/ff53d3e69a602d05342e15d9bb616884833ddbff
https://github.com/directus/directus/releases/tag/v9.23.0
https://github.com/directus/directus/security/advisories/GHSA-j3rg-3rgm-537h
Related Vulnerabilities
CVE-2020-28464 Vulnerability in npm package djv
CVE-2023-36542 Vulnerability in maven package org.apache.nifi:nifi-jms-processors
CVE-2023-26472 Vulnerability in maven package org.xwiki.platform:xwiki-platform-icon-ui
CVE-2022-40764 Vulnerability in npm package snyk-go-plugin
CVE-2021-25642 Vulnerability in maven package org.apache.hadoop:hadoop-yarn-server-resourcemanager