First published: Thu Aug 15 2024(Updated: )
Directus v10.13.0 allows an authenticated external attacker to execute arbitrary JavaScript on the client. This is possible because the application injects an attacker-controlled parameter that will be stored in the server and used by the client into an unsanitized DOM element. When chained with CVE-2024-6534, it could result in account takeover.
Credit: help@fluidattacks.com help@fluidattacks.com
Affected Software | Affected Version | How to fix |
---|---|---|
npm/directus | <=10.13.0 | |
Directus | =10.13.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-6533 has a high severity rating, indicating a significant security risk due to arbitrary JavaScript execution.
To fix CVE-2024-6533, upgrade Directus to a version later than 10.13.0 to ensure better input sanitization.
CVE-2024-6533 affects users of Directus version 10.13.0 who have authentication rights.
CVE-2024-6533 allows authenticated attackers to execute arbitrary JavaScript in the client's browser.
Yes, CVE-2024-6533 is primarily a client-side vulnerability that exploits unsanitized DOM injection.