CVE-2024-34709

MEDIUM

Monospace Directus < 10.11.0 - Insufficient Session Expiration

Title source: rule
STIX 2.1

Description

Directus is a real-time API and App dashboard for managing SQL database content. Prior to 10.11.0, session tokens function like the other JWT tokens where they are not actually invalidated when logging out. The `directus_session` gets destroyed and the cookie gets deleted but if the cookie value is captured, it will still work for the entire expiry time which is set to 1 day by default. Making it effectively a long lived unrevokable stateless token instead of the stateful session token it was meant to be. This vulnerability is fixed in 10.11.0.

Scores

CVSS v3 5.4
EPSS 0.0023
EPSS Percentile 45.2%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:N

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact partial

Details

CWE
CWE-613
Status published
Products (2)
monospace/directus < 10.11.0
npm/directus 10.10.0 - 10.11.0npm
Published May 14, 2024
Tracked Since Feb 18, 2026