cve/2024/CVE-2024-6533.md
2024-08-15 18:54:34 +00:00

18 lines
932 B
Markdown

### [CVE-2024-6533](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6533)
![](https://img.shields.io/static/v1?label=Product&message=Directus&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20'Cross-site%20Scripting')&color=brighgreen)
### Description
Directus v10.13.0 allows an authenticated external attacker to execute arbitrary JavaScript on the client. This is possible because the application injects an attacker-controlled parameter that will be stored in the server and used by the client into an unsanitized DOM element. When chained with CVE-2024-6534, it could result in account takeover.
### POC
#### Reference
- https://fluidattacks.com/advisories/bocelli
#### Github
No PoCs found on GitHub currently.