CVE-2021-26594

In Directus 8.x through 8.8.1, an attacker can switch to the administrator role (via the PATCH method) without any control by the back end. NOTE: This vulnerability only affects products that are no longer supported by the maintainer
References
Link Resource
https://github.com/sgranel/directusv8 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:rangerstudio:directus:*:*:*:*:*:*:*:*

History

07 Nov 2023, 03:31

Type Values Removed Values Added
Summary ** UNSUPPORTED WHEN ASSIGNED ** In Directus 8.x through 8.8.1, an attacker can switch to the administrator role (via the PATCH method) without any control by the back end. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. In Directus 8.x through 8.8.1, an attacker can switch to the administrator role (via the PATCH method) without any control by the back end. NOTE: This vulnerability only affects products that are no longer supported by the maintainer

01 Mar 2021, 20:52

Type Values Removed Values Added
CPE cpe:2.3:a:rangerstudio:directus:*:*:*:*:*:*:*:*
References (MISC) https://github.com/sgranel/directusv8 - (MISC) https://github.com/sgranel/directusv8 - Exploit, Third Party Advisory
CVSS v2 : unknown
v3 : unknown
v2 : 6.5
v3 : 8.8
CWE CWE-269

23 Feb 2021, 19:23

Type Values Removed Values Added
New CVE

Information

Published : 2021-02-23 19:15

Updated : 2024-04-11 01:10


NVD link : CVE-2021-26594

Mitre link : CVE-2021-26594

CVE.ORG link : CVE-2021-26594


JSON object : View

Products Affected

rangerstudio

  • directus
CWE
CWE-269

Improper Privilege Management