CVE-2024-34709
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
14/05/2024
Last modified:
03/01/2025
Description
Directus is a real-time API and App dashboard for managing SQL database content. Prior to 10.11.0, session tokens function like the other JWT tokens where they are not actually invalidated when logging out. The `directus_session` gets destroyed and the cookie gets deleted but if the cookie value is captured, it will still work for the entire expiry time which is set to 1 day by default. Making it effectively a long lived unrevokable stateless token instead of the stateful session token it was meant to be. This vulnerability is fixed in 10.11.0.
Impact
Base Score 3.x
5.40
Severity 3.x
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:monospace:directus:*:*:*:*:*:node.js:*:* | 10.11.0 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://github.com/directus/directus/commit/a6172f8a6a0f31a6bf4305a090de172ebfb63bcf
- https://github.com/directus/directus/security/advisories/GHSA-g65h-35f3-x2w3
- https://github.com/directus/directus/commit/a6172f8a6a0f31a6bf4305a090de172ebfb63bcf
- https://github.com/directus/directus/security/advisories/GHSA-g65h-35f3-x2w3