First published: Thu Aug 15 2024(Updated: )
Directus v10.13.0 allows an authenticated external attacker to modify presets created by the same user to assign them to another user. This is possible because the application only validates the user parameter in the 'POST /presets' request but not in the PATCH request. When chained with CVE-2024-6533, it could result in account takeover.
Credit: help@fluidattacks.com help@fluidattacks.com
Affected Software | Affected Version | How to fix |
---|---|---|
npm/directus | <=10.13.0 | |
Directus | =10.13.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-6534 is considered a medium severity vulnerability due to its potential impact on user data integrity.
To fix CVE-2024-6534, update Directus to a version higher than 10.13.0 where the vulnerability is patched.
CVE-2024-6534 affects any users of Directus v10.13.0, especially those with authenticated access.
CVE-2024-6534 is a privilege escalation vulnerability that allows users to modify presets improperly.
An attacker can modify presets created by another user using the same user credentials due to insufficient validation.