CVE-2024-27295:
Directus has MySQL accent insensitive email matching
8.2
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.64859%
CWE
Published
3/1/2024
Updated
3/2/2024
KEV Status
No
Technology
JavaScript
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
directus | npm | <= 10.8.2 | 10.8.3 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from two key issues visible in the patch: 1) getUserByEmail
didn't select the stored email, enabling mismatch between lookup and actual stored value 2) Password reset flow used attacker-provided email instead of database-verified email. The patch adds 'email' to the SELECT clause and switches all email references to use user.email
from the database. The pre-patch version of these functions contained the vulnerable pattern of trusting user input after a weak database comparison.