CVE-2024-6534: CWE-639 Authorization Bypass Through User-Controlled Key in Directus Directus
Directus v10.13.0 allows an authenticated external attacker to modify presets created by the same user to assign them to another user. This is possible because the application only validates the user parameter in the 'POST /presets' request but not in the PATCH request. When chained with CVE-2024-6533, it could result in account takeover.
AI Analysis
Technical Summary
CVE-2024-6534 is an authorization bypass vulnerability identified in Directus version 10.13.0, a popular open-source data platform used for managing database content through an API and admin app. The vulnerability arises because the application improperly validates the 'user' parameter in HTTP requests related to presets management. Specifically, while the 'POST /presets' endpoint correctly validates the user parameter to ensure that presets are created only for the authenticated user, the 'PATCH /presets' endpoint lacks this validation. This flaw allows an authenticated attacker to modify presets originally created by themselves and reassign them to another user. Although the vulnerability alone does not directly compromise confidentiality or availability, it results in an integrity violation by enabling unauthorized modification of user-associated data. Furthermore, when this vulnerability is chained with CVE-2024-6533 (details not provided here), it could escalate to a full account takeover, significantly increasing the threat severity. The CVSS 3.1 base score is 4.3 (medium severity), reflecting that the attack requires authentication (PR:L), no user interaction (UI:N), and has a limited impact on integrity without affecting confidentiality or availability. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability is classified under CWE-639 (Authorization Bypass Through User-Controlled Key), highlighting the failure to properly enforce access controls on user-modifiable keys in API requests.
Potential Impact
For European organizations using Directus 10.13.0, this vulnerability poses a moderate risk primarily to data integrity and user trust. Attackers with valid credentials could manipulate preset configurations, potentially disrupting workflows or misassigning data access privileges. In environments where presets control critical data views or permissions, such unauthorized changes could lead to confusion, data mismanagement, or indirect exposure of sensitive information. The risk escalates significantly if combined with CVE-2024-6533, potentially enabling attackers to take over user accounts, leading to broader unauthorized access, data exfiltration, or further lateral movement within organizational systems. This is particularly concerning for sectors with stringent data governance requirements such as finance, healthcare, and public administration prevalent in Europe. Although the vulnerability does not directly impact availability or confidentiality, the integrity compromise and potential for escalation necessitate timely attention to prevent exploitation.
Mitigation Recommendations
European organizations should implement the following specific mitigations: 1) Immediately audit and monitor usage of the 'PATCH /presets' API endpoint for anomalous activity, especially changes reassigning presets to different users. 2) Restrict access to Directus administrative and API interfaces to trusted networks and enforce strong authentication mechanisms, including multi-factor authentication (MFA), to reduce the risk of credential misuse. 3) Apply strict role-based access controls (RBAC) within Directus to limit which users can modify presets and assign them to others. 4) Monitor for and apply any forthcoming security patches or updates from Directus addressing this vulnerability. 5) Conduct a thorough review of preset configurations and user assignments to detect and remediate unauthorized changes. 6) If possible, implement additional application-layer validation or web application firewall (WAF) rules to enforce user parameter validation on PATCH requests as a temporary protective measure until official patches are available. 7) Educate developers and administrators about the risks of authorization bypass and the importance of consistent input validation across all API endpoints.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain
CVE-2024-6534: CWE-639 Authorization Bypass Through User-Controlled Key in Directus Directus
Description
Directus v10.13.0 allows an authenticated external attacker to modify presets created by the same user to assign them to another user. This is possible because the application only validates the user parameter in the 'POST /presets' request but not in the PATCH request. When chained with CVE-2024-6533, it could result in account takeover.
AI-Powered Analysis
Technical Analysis
CVE-2024-6534 is an authorization bypass vulnerability identified in Directus version 10.13.0, a popular open-source data platform used for managing database content through an API and admin app. The vulnerability arises because the application improperly validates the 'user' parameter in HTTP requests related to presets management. Specifically, while the 'POST /presets' endpoint correctly validates the user parameter to ensure that presets are created only for the authenticated user, the 'PATCH /presets' endpoint lacks this validation. This flaw allows an authenticated attacker to modify presets originally created by themselves and reassign them to another user. Although the vulnerability alone does not directly compromise confidentiality or availability, it results in an integrity violation by enabling unauthorized modification of user-associated data. Furthermore, when this vulnerability is chained with CVE-2024-6533 (details not provided here), it could escalate to a full account takeover, significantly increasing the threat severity. The CVSS 3.1 base score is 4.3 (medium severity), reflecting that the attack requires authentication (PR:L), no user interaction (UI:N), and has a limited impact on integrity without affecting confidentiality or availability. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability is classified under CWE-639 (Authorization Bypass Through User-Controlled Key), highlighting the failure to properly enforce access controls on user-modifiable keys in API requests.
Potential Impact
For European organizations using Directus 10.13.0, this vulnerability poses a moderate risk primarily to data integrity and user trust. Attackers with valid credentials could manipulate preset configurations, potentially disrupting workflows or misassigning data access privileges. In environments where presets control critical data views or permissions, such unauthorized changes could lead to confusion, data mismanagement, or indirect exposure of sensitive information. The risk escalates significantly if combined with CVE-2024-6533, potentially enabling attackers to take over user accounts, leading to broader unauthorized access, data exfiltration, or further lateral movement within organizational systems. This is particularly concerning for sectors with stringent data governance requirements such as finance, healthcare, and public administration prevalent in Europe. Although the vulnerability does not directly impact availability or confidentiality, the integrity compromise and potential for escalation necessitate timely attention to prevent exploitation.
Mitigation Recommendations
European organizations should implement the following specific mitigations: 1) Immediately audit and monitor usage of the 'PATCH /presets' API endpoint for anomalous activity, especially changes reassigning presets to different users. 2) Restrict access to Directus administrative and API interfaces to trusted networks and enforce strong authentication mechanisms, including multi-factor authentication (MFA), to reduce the risk of credential misuse. 3) Apply strict role-based access controls (RBAC) within Directus to limit which users can modify presets and assign them to others. 4) Monitor for and apply any forthcoming security patches or updates from Directus addressing this vulnerability. 5) Conduct a thorough review of preset configurations and user assignments to detect and remediate unauthorized changes. 6) If possible, implement additional application-layer validation or web application firewall (WAF) rules to enforce user parameter validation on PATCH requests as a temporary protective measure until official patches are available. 7) Educate developers and administrators about the risks of authorization bypass and the importance of consistent input validation across all API endpoints.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Fluid Attacks
- Date Reserved
- 2024-07-05T14:42:09.575Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0f81484d88663aeb4e4
Added to database: 5/20/2025, 6:59:04 PM
Last enriched: 7/4/2025, 1:40:27 PM
Last updated: 8/16/2025, 3:42:16 PM
Views: 19
Related Threats
CVE-2025-9095: Cross Site Scripting in ExpressGateway express-gateway
MediumCVE-2025-7342: CWE-798 Use of Hard-coded Credentials in Kubernetes Image Builder
HighCVE-2025-9094: Improper Neutralization of Special Elements Used in a Template Engine in ThingsBoard
MediumCVE-2025-9093: Improper Export of Android Application Components in BuzzFeed App
MediumCVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.