Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-8jpw-gpr4-8cmh: Directus's conceal fields are searchable if read permissions enabled

Summary

A vulnerability allows authenticated users to search concealed/sensitive fields when they have read permissions. While actual values remain masked (****), successful matches can be detected through returned records, enabling enumeration attacks on sensitive data.

Details

The system permits search operations on concealed fields in the directus_users collection, including token, tfa_secret, password. Matching records are returned with masked values, but their presence confirms the searched value exists.

The “Recommended Defaults” for “App Access” grant users full read permissions to their role/user records, inadvertently enabling them to search for any user’s tokens, TFA secrets, and password hashes. Attackers can leverage known password hashes from breach databases to identify accounts with compromised passwords.

Impact

This vulnerability enables:

  • Token enumeration - Verification of valid authentication tokens
  • Password hash matching - Identification of accounts using known compromised passwords
  • Information disclosure - Confirmation of sensitive value existence without viewing actual data
  • Increased attack surface - Default permissions automatically expose all deployments using recommended settings

The risk is particularly high for password fields, where attackers can cross-reference publicly available hash databases to identify vulnerable accounts.

ghsa
#vulnerability#auth

Summary

A vulnerability allows authenticated users to search concealed/sensitive fields when they have read permissions. While actual values remain masked (****), successful matches can be detected through returned records, enabling enumeration attacks on sensitive data.

Details

The system permits search operations on concealed fields in the directus_users collection, including token, tfa_secret, password. Matching records are returned with masked values, but their presence confirms the searched value exists.

The “Recommended Defaults” for “App Access” grant users full read permissions to their role/user records, inadvertently enabling them to search for any user’s tokens, TFA secrets, and password hashes. Attackers can leverage known password hashes from breach databases to identify accounts with compromised passwords.

Impact

This vulnerability enables:

  • Token enumeration - Verification of valid authentication tokens
  • Password hash matching - Identification of accounts using known compromised passwords
  • Information disclosure - Confirmation of sensitive value existence without viewing actual data
  • Increased attack surface - Default permissions automatically expose all deployments using recommended settings

The risk is particularly high for password fields, where attackers can cross-reference publicly available hash databases to identify vulnerable accounts.

References

  • GHSA-8jpw-gpr4-8cmh
  • directus/directus@7737d56

ghsa: Latest News

GHSA-j4rc-96xj-gvqc: phpMyFAQ: Public API endpoints expose emails and invisible questions