
Cloud Vulnerability DB
A community-led vulnerabilities database
Directus, a real-time API and App dashboard for managing SQL database content, was affected by a cross-site scripting (XSS) vulnerability tracked as CVE-2022-24814. The vulnerability was discovered in versions prior to 9.7.0 and was disclosed on April 4, 2022. The issue affected the file upload functionality of the content management system (ZDNET, NVD).
The vulnerability allowed unauthorized JavaScript execution through a specific attack chain. An attacker could insert an iframe into the rich text HTML interface that links to an uploaded HTML file, which in turn loads another uploaded JavaScript file in its script tag. This method bypassed the regular content security policy header, enabling arbitrary JavaScript execution. The vulnerability received a CVSS v3.1 base score of 6.1 (MEDIUM) from NVD and 8.8 (HIGH) from GitHub (NVD).
If successfully exploited, the vulnerability could lead to account compromise through unauthorized JavaScript execution. The attack could be triggered when users viewed certain collections or files on the platform, potentially allowing attackers to execute arbitrary code in the context of the user's session (ZDNET).
The vulnerability was patched in Directus version 9.7.0. For users unable to upgrade immediately, a workaround was provided to disable the live embed feature in the WYSIWYG editor by adding { "media_live_embeds": false } to the Options Overrides option of the Rich Text HTML interface (GitHub Advisory, Directus Release).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."