Description
Directus is a real-time API and App dashboard for managing SQL database content. Directus is vulnerable to Server-Side Request Forgery (SSRF) when importing a file from a remote web server (POST to `/files/import`). An attacker can bypass the security controls by performing a DNS rebinding attack and view sensitive data from internal servers or perform a local port scan. An attacker can exploit this vulnerability to access highly sensitive internal server(s) and steal sensitive information. This issue was fixed in version 9.23.0.
References (3)
Core 3
Core References
Exploit, Third Party Advisory x_refsource_confirm
https://github.com/directus/directus/security/advisories/GHSA-j3rg-3rgm-537h
Patch x_refsource_misc
https://github.com/directus/directus/commit/ff53d3e69a602d05342e15d9bb616884833ddbff
Release Notes x_refsource_misc
https://github.com/directus/directus/releases/tag/v9.23.0
Scores
CVSS v3
5.0
EPSS
0.0023
EPSS Percentile
45.5%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-918
Status
published
Products (2)
monospace/directus
< 9.23.0
npm/directus
0 - 9.23.0npm
Published
Mar 03, 2023
Tracked Since
Feb 18, 2026