Description
Directus is a real-time API and App dashboard for managing SQL database content. Directus is vulnerable to Server-Side Request Forgery (SSRF) when importing a file from a remote web server (POST to `/files/import`). An attacker can bypass the security controls by performing a DNS rebinding attack and view sensitive data from internal servers or perform a local port scan. An attacker can exploit this vulnerability to access highly sensitive internal server(s) and steal sensitive information. This issue was fixed in version 9.23.0.
Remediation
References
https://github.com/directus/directus/security/advisories/GHSA-j3rg-3rgm-537h
https://github.com/directus/directus/commit/ff53d3e69a602d05342e15d9bb616884833ddbff
https://github.com/directus/directus/releases/tag/v9.23.0
Related Vulnerabilities
CVE-2020-7722 Vulnerability in npm package nodee-utils
CVE-2023-26487 Vulnerability in npm package vega
CVE-2021-27515 Vulnerability in maven package org.webjars.npm:url-parse
CVE-2021-43138 Vulnerability in maven package org.webjars.bowergithub.caolan:async
CVE-2021-21267 Vulnerability in npm package schema-inspector