cve/2023/CVE-2023-28443.md
2024-06-18 02:51:15 +02:00

20 lines
1.1 KiB
Markdown

### [CVE-2023-28443](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28443)
![](https://img.shields.io/static/v1?label=Product&message=directus&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%209.23.3%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-284%3A%20Improper%20Access%20Control&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File&color=brighgreen)
### Description
Directus is a real-time API and App dashboard for managing SQL database content. Prior to version 9.23.3, the `directus_refresh_token` is not redacted properly from the log outputs and can be used to impersonate users without their permission. This issue is patched in version 9.23.3.
### POC
#### Reference
- https://github.com/directus/directus/commit/349536303983ccba68ecb3e4fb35315424011afc
- https://github.com/directus/directus/security/advisories/GHSA-8vg2-wf3q-mwv7
#### Github
No PoCs found on GitHub currently.