Description
Directus is a real-time API and App dashboard for managing SQL database content. Prior to version 9.23.3, the `directus_refresh_token` is not redacted properly from the log outputs and can be used to impersonate users without their permission. This issue is patched in version 9.23.3.
Remediation
References
https://github.com/directus/directus/blob/7c479c5161639aac466c763b6b958a9524201d74/api/src/logger.ts#L13
https://github.com/directus/directus/commit/349536303983ccba68ecb3e4fb35315424011afc
https://github.com/directus/directus/security/advisories/GHSA-8vg2-wf3q-mwv7
Related Vulnerabilities
CVE-2018-8014 Vulnerability in maven package org.apache.tomcat.embed:tomcat-embed-core
CVE-2016-8744 Vulnerability in maven package org.apache.brooklyn:brooklyn
CVE-2015-8858 Vulnerability in maven package org.webjars.npm:uglify-js
CVE-2023-24441 Vulnerability in maven package org.jvnet.hudson.plugins:mstest
CVE-2019-10362 Vulnerability in maven package io.jenkins:configuration-as-code