CVE-2024-47822
CVSS 3.1 Score 4.2 of 10 (medium)
Details
Summary
CVE-2024-47822 affects Directus, a real-time API and App dashboard for managing SQL database content. The vulnerability arises from the exposure of access tokens in system logs due to them not being redacted when the `LOG_STYLE` is set to `raw`. An attacker with access to these logs can potentially gain administrative control, leading to unauthorized data access and manipulation. Long-lived static tokens provided through query strings are at risk. Users with impacted systems should rotate their static tokens and upgrade to version 10.13.2 or later to apply the patch. There are currently no known workarounds for this vulnerability.
Prevent cyber attacks with Recorded Future by prioritizing and patching critical vulnerabilities being exploited by threat actors targeting your industry. Book your demo to learn more.
Affected Products
- Monospace Directus
Affected Vendors
- Monospace