Miggo Logo

CVE-2023-45820:
Directus crashes on invalid WebSocket message

7.5

CVSS Score
3.1

Basic Information

EPSS Score
0.57527%
Published
10/19/2023
Updated
11/6/2023
KEV Status
No
Technology
TechnologyJavaScript

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
directusnpm>= 10.4.0, < 10.6.210.6.2

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability manifests in WebSocket upgrade handlers that failed to properly handle protocol errors. The commit diff shows the fix added a catchInvalidMessages method with error listeners to multiple upgrade paths. The vulnerable functions are the pre-patch versions of handleUpgrade and handleHandshakeUpgrade in SocketController, which lacked this error handling. These functions directly process WebSocket connections and were missing critical error event handlers, allowing malformed frames to trigger uncaught exceptions that crash the Node.js process.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Summ*ry It s**ms t**t *ny *ir**tus inst*ll*tion t**t **s w**so*k*ts *n**l** **n ** *r*s*** i* t** w**so*k*t s*rv*r r***iv*s *n inv*li* *r*m*. T*is *oul* pro***ly ** post** *s *n issu* *n* I mi**t *v*n ** **l* to put to**t**r * pull r*qu*st *or *

Reasoning

T** vuln*r**ility m*ni**sts in W**So*k*t up*r*** **n*l*rs t**t **il** to prop*rly **n*l* proto*ol *rrors. T** *ommit *i** s*ows t** *ix ***** * `**t**Inv*li*M*ss***s` m*t*o* wit* *rror list*n*rs to multipl* up*r*** p*t*s. T** vuln*r**l* *un*tions *r*