Skip to main content

CVE-2024-6534: CWE-639 Authorization Bypass Through User-Controlled Key in Directus Directus

Medium
VulnerabilityCVE-2024-6534cvecve-2024-6534cwe-639
Published: Thu Aug 15 2024 (08/15/2024, 03:10:46 UTC)
Source: CVE
Vendor/Project: Directus
Product: Directus

Description

Directus v10.13.0 allows an authenticated external attacker to modify presets created by the same user to assign them to another user. This is possible because the application only validates the user parameter in the 'POST /presets' request but not in the PATCH request. When chained with CVE-2024-6533, it could result in account takeover.

AI-Powered Analysis

AILast updated: 07/04/2025, 13:40:27 UTC

Technical Analysis

CVE-2024-6534 is an authorization bypass vulnerability identified in Directus version 10.13.0, a popular open-source data platform used for managing database content through an API and admin app. The vulnerability arises because the application improperly validates the 'user' parameter in HTTP requests related to presets management. Specifically, while the 'POST /presets' endpoint correctly validates the user parameter to ensure that presets are created only for the authenticated user, the 'PATCH /presets' endpoint lacks this validation. This flaw allows an authenticated attacker to modify presets originally created by themselves and reassign them to another user. Although the vulnerability alone does not directly compromise confidentiality or availability, it results in an integrity violation by enabling unauthorized modification of user-associated data. Furthermore, when this vulnerability is chained with CVE-2024-6533 (details not provided here), it could escalate to a full account takeover, significantly increasing the threat severity. The CVSS 3.1 base score is 4.3 (medium severity), reflecting that the attack requires authentication (PR:L), no user interaction (UI:N), and has a limited impact on integrity without affecting confidentiality or availability. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability is classified under CWE-639 (Authorization Bypass Through User-Controlled Key), highlighting the failure to properly enforce access controls on user-modifiable keys in API requests.

Potential Impact

For European organizations using Directus 10.13.0, this vulnerability poses a moderate risk primarily to data integrity and user trust. Attackers with valid credentials could manipulate preset configurations, potentially disrupting workflows or misassigning data access privileges. In environments where presets control critical data views or permissions, such unauthorized changes could lead to confusion, data mismanagement, or indirect exposure of sensitive information. The risk escalates significantly if combined with CVE-2024-6533, potentially enabling attackers to take over user accounts, leading to broader unauthorized access, data exfiltration, or further lateral movement within organizational systems. This is particularly concerning for sectors with stringent data governance requirements such as finance, healthcare, and public administration prevalent in Europe. Although the vulnerability does not directly impact availability or confidentiality, the integrity compromise and potential for escalation necessitate timely attention to prevent exploitation.

Mitigation Recommendations

European organizations should implement the following specific mitigations: 1) Immediately audit and monitor usage of the 'PATCH /presets' API endpoint for anomalous activity, especially changes reassigning presets to different users. 2) Restrict access to Directus administrative and API interfaces to trusted networks and enforce strong authentication mechanisms, including multi-factor authentication (MFA), to reduce the risk of credential misuse. 3) Apply strict role-based access controls (RBAC) within Directus to limit which users can modify presets and assign them to others. 4) Monitor for and apply any forthcoming security patches or updates from Directus addressing this vulnerability. 5) Conduct a thorough review of preset configurations and user assignments to detect and remediate unauthorized changes. 6) If possible, implement additional application-layer validation or web application firewall (WAF) rules to enforce user parameter validation on PATCH requests as a temporary protective measure until official patches are available. 7) Educate developers and administrators about the risks of authorization bypass and the importance of consistent input validation across all API endpoints.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Fluid Attacks
Date Reserved
2024-07-05T14:42:09.575Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f81484d88663aeb4e4

Added to database: 5/20/2025, 6:59:04 PM

Last enriched: 7/4/2025, 1:40:27 PM

Last updated: 8/16/2025, 3:42:16 PM

Views: 19

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats