Description
Directus is a real-time API and App dashboard for managing SQL database content. Prior to version 9.23.3, the `directus_refresh_token` is not redacted properly from the log outputs and can be used to impersonate users without their permission. This issue is patched in version 9.23.3.
Remediation
References
https://github.com/directus/directus/security/advisories/GHSA-8vg2-wf3q-mwv7
https://github.com/directus/directus/commit/349536303983ccba68ecb3e4fb35315424011afc
https://github.com/directus/directus/blob/7c479c5161639aac466c763b6b958a9524201d74/api/src/logger.ts#L13
Related Vulnerabilities
CVE-2017-16146 Vulnerability in npm package mockserve
CVE-2010-4172 Vulnerability in maven package org.apache.tomcat.embed:tomcat-embed-core
CVE-2022-24898 Vulnerability in maven package org.xwiki.commons:xwiki-commons-xml
CVE-2017-3201 Vulnerability in maven package com.exadel.flamingo.flex:amf-serializer
CVE-2022-41966 Vulnerability in maven package com.thoughtworks.xstream:xstream