漏洞标题
将HTML注入到密码重置电子邮件中,映射到Directus中的自定义重置URL
漏洞描述信息
在直接使用Password Reset电子邮件中的HTML注入到自定义Reset URL中
CVSS信息
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
漏洞类别
N/A
漏洞标题
HTML Injection in Password Reset email to custom Reset URL in directus
漏洞描述信息
Directus is a real-time API and App dashboard for managing SQL database content. Instances relying on an allow-listed reset URL are vulnerable to an HTML injection attack through the use of query parameters in the reset URL. An attacker could exploit this to email users urls to the servers domain but which may contain malicious code. The problem has been resolved and released under version 9.23.0. People relying on a custom password reset URL should upgrade to 9.23.0 or later, or remove the custom reset url from the configured allow list. Users are advised to upgrade. Users unable to upgrade may disable the custom reset URL allow list as a workaround.
CVSS信息
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N
漏洞类别
在Web页面生成时对输入的转义处理不恰当(跨站脚本)
漏洞标题
Directus 跨站脚本漏洞
漏洞描述信息
Directus是一个实时 Api 和应用程序仪表板。用于管理 Sql 数据库内容。 Directus 9.23.0之前版本存在跨站脚本漏洞,该漏洞源于容易受到HTML注入攻击。
CVSS信息
N/A
漏洞类别
跨站脚本