CVE-2024-39896
HIGHMonospace Directus < 10.13.0 - Information Disclosure
Title source: ruleDescription
Directus is a real-time API and App dashboard for managing SQL database content. When relying on SSO providers in combination with local authentication it can be possible to enumerate existing SSO users in the instance. This is possible because if an email address exists in Directus and belongs to a known SSO provider then it will throw a "helpful" error that the user belongs to another provider. This vulnerability is fixed in 10.13.0.
References (2)
Core 2
Core References
Exploit, Vendor Advisory x_refsource_confirm
https://github.com/directus/directus/security/advisories/GHSA-jgf4-vwc3-r46v
Scores
CVSS v3
7.5
EPSS
0.0053
EPSS Percentile
67.3%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
yes
Technical Impact
partial
Details
CWE
CWE-200
Status
published
Products (2)
monospace/directus
< 10.13.0
npm/directus
9.11 - 10.13.0npm
Published
Jul 08, 2024
Tracked Since
Feb 18, 2026