Description
Directus is a real-time API and App dashboard for managing SQL database content. Prior to version 9.23.3, the `directus_refresh_token` is not redacted properly from the log outputs and can be used to impersonate users without their permission. This issue is patched in version 9.23.3.
Remediation
References
https://github.com/directus/directus/security/advisories/GHSA-8vg2-wf3q-mwv7
https://github.com/directus/directus/commit/349536303983ccba68ecb3e4fb35315424011afc
https://github.com/directus/directus/blob/7c479c5161639aac466c763b6b958a9524201d74/api/src/logger.ts#L13
Related Vulnerabilities
CVE-2014-0002 Vulnerability in maven package org.apache.camel:camel-core
CVE-2022-25760 Vulnerability in npm package accesslog
CVE-2023-49798 Vulnerability in npm package @openzeppelin/contracts-upgradeable
CVE-2023-25194 Vulnerability in maven package org.apache.kafka:kafka-clients
CVE-2023-33006 Vulnerability in maven package org.jenkins-ci.plugins:wso2id-oauth