First published: Tue Feb 23 2021(Updated: )
** UNSUPPORTED WHEN ASSIGNED ** In Directus 8.x through 8.8.1, an attacker can discover whether a user is present in the database through the password reset feature. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
>=8.0.0<=8.8.1 | ||
Rangerstudio Directus | >=8.0.0<=8.8.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-27583 refers to a vulnerability in Directus 8.x through 8.8.1 that allows an attacker to discover whether a user is present in the database through the password reset feature.
Yes, Directus 8.x through 8.8.1 is affected by CVE-2021-27583.
CVE-2021-27583 has a severity rating of 5.3 (medium).
An attacker can exploit CVE-2021-27583 by using the password reset feature to determine whether a user is present in the database.
Since the affected products are no longer supported by the maintainer, there may not be an official fix available for CVE-2021-27583.