76 lines
3.3 KiB
JSON
Raw Normal View History

{
"id": "CVE-2024-46990",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-09-18T17:15:19.687",
"lastModified": "2024-09-20T12:30:17.483",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Directus is a real-time API and App dashboard for managing SQL database content. When relying on blocking access to localhost using the default `0.0.0.0` filter a user may bypass this block by using other registered loopback devices (like `127.0.0.2` - `127.127.127.127`). This issue has been addressed in release versions 10.13.3 and 11.1.0. Users are advised to upgrade. Users unable to upgrade may block this bypass by manually adding the `127.0.0.0/8` CIDR range which will block access to any `127.X.X.X` ip instead of just `127.0.0.1`."
},
{
"lang": "es",
"value": "Directus es una API en tiempo real y un panel de control de aplicaciones para administrar el contenido de la base de datos SQL. Cuando se conf\u00eda en bloquear el acceso al host local mediante el filtro predeterminado `0.0.0.0`, un usuario puede omitir este bloqueo mediante el uso de otros dispositivos de bucle invertido registrados (como `127.0.0.2` - `127.127.127.127`). Este problema se ha solucionado en las versiones de lanzamiento 10.13.3 y 11.1.0. Se recomienda a los usuarios que actualicen. Los usuarios que no puedan actualizar pueden bloquear esta omisi\u00f3n agregando manualmente el rango CIDR `127.0.0.0/8` que bloquear\u00e1 el acceso a cualquier IP `127.XXX` en lugar de solo `127.0.0.1`."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://github.com/directus/directus/commit/4aace0bbe57232e38cd6a287ee475293e46dc91b",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/directus/directus/commit/769fa22797bff5a9231599883b391e013f122e52",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/directus/directus/commit/8cbf943b65fd4a763d09a5fdbba8996b1e7797ff",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/directus/directus/commit/c1f3ccc681595038d094ce110ddeee38cb38f431",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/directus/directus/security/advisories/GHSA-68g8-c275-xf2m",
"source": "security-advisories@github.com"
}
]
}