Password reset vulnerability in Directus backend allows attackers to receive password reset email of a victim user
CVE-2024-27295

8.2HIGH

Key Information:

Vendor

Directus

Status
Vendor
CVE Published:
1 March 2024

What is CVE-2024-27295?

The vulnerability presents a significant security concern in Directus, a real-time API and App dashboard for managing SQL database content. The flaw resides in the password reset mechanism, where attackers can exploit the configuration of MySQL/MariaDB that allows for accent-insensitive and case-insensitive email comparisons. This enables an attacker to receive a password reset email intended for a victim user, by using an email address that appears similar but contains accented characters. The vulnerability has been addressed in Directus version 10.8.3, highlighting the importance of upgrading to mitigate potential risks.

Affected Version(s)

directus < 10.8.3

References

CVSS V3.1

Score:
8.2
Severity:
HIGH
Confidentiality:
High
Integrity:
Low
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.