{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-46990","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2024-09-16T16:10:09.019Z","datePublished":"2024-09-18T16:55:24.255Z","dateUpdated":"2024-09-18T18:19:24.086Z"},"containers":{"cna":{"title":"SSRF Loopback IP filter bypass in directus","problemTypes":[{"descriptions":[{"cweId":"CWE-284","lang":"en","description":"CWE-284: Improper Access Control","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":5,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"NONE","privilegesRequired":"LOW","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N","version":"3.1"}}],"references":[{"name":"https://github.com/directus/directus/security/advisories/GHSA-68g8-c275-xf2m","tags":["x_refsource_CONFIRM"],"url":"https://github.com/directus/directus/security/advisories/GHSA-68g8-c275-xf2m"},{"name":"https://github.com/directus/directus/commit/4aace0bbe57232e38cd6a287ee475293e46dc91b","tags":["x_refsource_MISC"],"url":"https://github.com/directus/directus/commit/4aace0bbe57232e38cd6a287ee475293e46dc91b"},{"name":"https://github.com/directus/directus/commit/769fa22797bff5a9231599883b391e013f122e52","tags":["x_refsource_MISC"],"url":"https://github.com/directus/directus/commit/769fa22797bff5a9231599883b391e013f122e52"},{"name":"https://github.com/directus/directus/commit/8cbf943b65fd4a763d09a5fdbba8996b1e7797ff","tags":["x_refsource_MISC"],"url":"https://github.com/directus/directus/commit/8cbf943b65fd4a763d09a5fdbba8996b1e7797ff"},{"name":"https://github.com/directus/directus/commit/c1f3ccc681595038d094ce110ddeee38cb38f431","tags":["x_refsource_MISC"],"url":"https://github.com/directus/directus/commit/c1f3ccc681595038d094ce110ddeee38cb38f431"}],"affected":[{"vendor":"directus","product":"directus","versions":[{"version":"< 10.13.3","status":"affected"},{"version":">= 11.0.0, < 11.1.0","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2024-09-18T16:55:24.255Z"},"descriptions":[{"lang":"en","value":"Directus is a real-time API and App dashboard for managing SQL database content. When relying on blocking access to localhost using the default `0.0.0.0` filter a user may bypass this block by using other registered loopback devices (like `127.0.0.2` - `127.127.127.127`). This issue has been addressed in release versions 10.13.3 and 11.1.0. Users are advised to upgrade. Users unable to upgrade may block this bypass by manually adding the `127.0.0.0/8` CIDR range which will block access to any `127.X.X.X` ip instead of just `127.0.0.1`."}],"source":{"advisory":"GHSA-68g8-c275-xf2m","discovery":"UNKNOWN"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-09-18T18:14:11.914898Z","id":"CVE-2024-46990","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-09-18T18:19:24.086Z"}}]}}