CVE-2024-54151: Directus allows unauthenticated access to WebSocket events and operations

7.5 CVSS

Description

Directus is a real-time API and App dashboard for managing SQL database content. Starting in version 11.0.0 and prior to version 11.3.0, when setting `WEBSOCKETS_GRAPHQL_AUTH` or `WEBSOCKETS_REST_AUTH` to "public", an unauthenticated user is able to do any of the supported operations (CRUD, subscriptions) with full admin privileges. This impacts any Directus instance that has either `WEBSOCKETS_GRAPHQL_AUTH` or `WEBSOCKETS_REST_AUTH` set to `public` allowing unauthenticated users to subscribe for changes on any collection or do REST CRUD operations on user defined collections ignoring permissions. Version 11.3.0 fixes the issue.

Classification

CVE ID: CVE-2024-54151

CVSS Base Severity: HIGH

CVSS Base Score: 7.5

Affected Products

Vendor: directus

Product: directus

Exploit Prediction Scoring System (EPSS)

EPSS Score: 0.04% (probability of being exploited)

EPSS Percentile: 11.44% (scored less or equal to compared to others)

EPSS Date: 2025-02-03 (when was this score calculated)

References

https://github.com/directus/directus/security/advisories/GHSA-849r-qrwj-8rv4
https://github.com/directus/directus/commit/ce0397d16cf767b5293cd57f626c5349b5732a21

Timeline