Miggo Logo

CVE-2024-54151: Directus allows unauthenticated access to WebSocket events and operations

7.5

CVSS Score
3.1

Basic Information

EPSS Score
0.31141%
Published
12/9/2024
Updated
12/9/2024
KEV Status
No
Technology
TechnologyJavaScript

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
directusnpm>= 11.0.0, < 11.3.011.3.0
@directus/apinpm>= 22.2.0, < 23.2.023.2.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from WebSocket connection handlers initializing accountability to null. The commit diff shows both base.ts and graphql.ts were modified to replace 'null' with createDefaultAccountability(). These locations directly control authentication state for WebSocket connections, and null accountability (post-Permissions Policy update) erroneously granted admin access instead of public permissions. The files/line changes match the vulnerability description and CWE-200 exposure pattern.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Summ*ry W**n s*ttin* `W**SO*K*TS_*R*P*QL_*UT*` or `W**SO*K*TS_R*ST_*UT*` to "pu*li*", *n un*ut**nti**t** us*r is **l* to *o *ny o* t** support** op*r*tions (*RU*, su*s*riptions) wit* *ull **min privil***s. ### **t*ils ***ount**ility *or un*ut**n

Reasoning

T** vuln*r**ility st*ms *rom W**So*k*t *onn**tion **n*l*rs initi*lizin* ***ount**ility to null. T** *ommit *i** s*ows *ot* `**s*.ts` *n* `*r*p*ql.ts` w*r* mo*i*i** to r*pl*** 'null' wit* `*r**t*****ult***ount**ility()`. T**s* lo**tions *ir**tly *ontr