In Directus, versions 9.0.0-alpha.4 through 9.4.1 allow unrestricted file upload of .html files in the media upload functionality, which leads to Cross-Site Scripting vulnerability. A low privileged attacker can upload a crafted HTML file as a profile avatar, and when an admin or another user opens it, the XSS payload gets triggered.
Solution:
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://github.com/directus/directus/commit/ec86d5412d45136915d9b622b4a890dd26932b10 | third party advisory patch |
https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22117 | third party advisory exploit |