Skip to content

HTML Injection in Password Reset email to custom Reset URL

High
br41nslug published GHSA-4hmq-ggrm-qfc6 Mar 6, 2023

Package

npm directus (npm)

Affected versions

<= 9.22.4

Patched versions

9.23.0

Description

Impact

What kind of vulnerability is it? Who is impacted?

Instances relying on an allow-listed reset URL are vulnerable to an HTML injection attack through the use of query parameters in the reset URL.

Patches

Has the problem been patched? What versions should users upgrade to?

The problem has been resolved and released under version 9.23.0. People relying on a custom password reset URL should upgrade to 9.23.0 or later, or remove the custom reset url from the configured allow list.

Workarounds

Is there a way for users to fix or remediate the vulnerability without upgrading?

Disable the custom reset URL allow list.

References

Are there any links users can visit to find out more?

#17120
#17119

Severity

High
7.5
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
None
User interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
High
Availability
None
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

CVE ID

CVE-2023-27474

Weaknesses

Credits