CVE-2024-28238

CVSS 3.1 Score 2.3 of 10 (low)

Details

Published Mar 12, 2024
Updated: Mar 13, 2024
CWE ID 200
CWE ID 598

Summary

CVE-2024-28238 is a secondary vulnerability affecting Directus, a real-time API and App dashboard used for managing SQL database content. The vulnerability arises when a JSON Web Token (JWT) is passed via a GET request to the /files page. This poses a security risk as the inclusion of session tokens in URLs can be logged in various places, such as web server logs and browser history. If attackers gain access to these logs, they may hijack active user sessions, leading to unauthorized access to sensitive information or actions on behalf of the user. The issue has been addressed in version 10.10.0 of Directus, and users are advised to upgrade as there are no known workarounds for this vulnerability. The base severity of this vulnerability is rated as LOW, with a base score of 2.3 according to the CVSS:3.1 scoring system.

Prevent cyber attacks with Recorded Future by prioritizing and patching critical vulnerabilities being exploited by threat actors targeting your industry. Book your demo to learn more.

Share

Prioritize, Pinpoint, and Act to Prevent Vulnerability Exploits with Recorded Future

Note: This is just a basic overview providing quick insights into CVE-2024-28238 information. Gain full access to comprehensive CVE data, third party vulnerabilities, compromised credentials and more with Recorded Future
  • Gain complete coverage of your cyber, third party, and physical attack surface
  • Proactively mitigate threats before they turn into costly attacks
  • Make fast, effective, data-driven decisions