CVE-2024-6533
📋 TL;DR
CVE-2024-6533 is a stored cross-site scripting (XSS) vulnerability in Directus v10.13.0 that allows authenticated attackers to inject malicious JavaScript into the application. This affects all users of the vulnerable version who have access to the affected functionality. When combined with CVE-2024-6534, this could lead to account takeover.
💻 Affected Systems
- Directus
📦 What is this software?
Directus by Monospace
⚠️ Risk & Real-World Impact
Worst Case
Account takeover leading to complete system compromise, data theft, and further lateral movement within the environment.
Likely Case
Session hijacking, credential theft, and unauthorized actions performed by attackers using victim sessions.
If Mitigated
Limited impact with proper input validation and output encoding, potentially only affecting individual user sessions.
🎯 Exploit Status
Exploitation requires authenticated access. The vulnerability is well-documented in public advisories.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: v10.13.1 or later
Vendor Advisory: https://directus.io/
Restart Required: Yes
Instructions:
1. Backup your Directus instance and database. 2. Update Directus to version 10.13.1 or later using your package manager. 3. Restart the Directus service. 4. Verify the update was successful.
🔧 Temporary Workarounds
Input Validation Filter
allImplement server-side input validation to sanitize user-controlled parameters before storage.
Content Security Policy
allImplement strict Content Security Policy headers to limit script execution.
Content-Security-Policy: default-src 'self'; script-src 'self'
🧯 If You Can't Patch
- Restrict access to the Directus interface to trusted users only
- Implement web application firewall rules to block XSS payloads
🔍 How to Verify
Check if Vulnerable:
Check if Directus version is exactly 10.13.0. Review application logs for suspicious parameter injection attempts.
Check Version:
Check package.json or run: npm list directus
Verify Fix Applied:
Confirm Directus version is 10.13.1 or later. Test the previously vulnerable functionality with XSS payloads.
📡 Detection & Monitoring
Log Indicators:
- Unusual parameter values containing script tags or JavaScript code
- Multiple failed authentication attempts followed by successful login
Network Indicators:
- HTTP requests with suspicious parameters containing script elements
- Unexpected outbound connections from the Directus server
SIEM Query:
source="directus" AND (param="*<script>*" OR param="*javascript:*")