Directus vulnerable to extraction of password hashes through export querying
Description
Published by the National Vulnerability Database
Mar 7, 2023
Published to the GitHub Advisory Database
Mar 8, 2023
Reviewed
Mar 8, 2023
Last updated
Mar 26, 2023
Impact
Users with read access to the
password
field indirectus_users
can extract the argon2 password hashes by brute forcing the export functionality combined with a_starts_with
filter. This allows the user to enumerate the password hashes.Patches
The problem has been patched by preventing any hashed/concealed field to be filtered against with the
_starts_with
or other string operator.Workarounds
Ensuring that no user has
read
access to thepassword
field indirectus_users
is sufficient to prevent this vulnerability.For more information
If you have any questions or comments about this advisory:
References