6.5
CVSSv2

CVE-2021-29641

Published: 07/04/2021 Updated: 13/04/2021
CVSS v2 Base Score: 6.5 | Impact Score: 6.4 | Exploitability Score: 8
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 578
Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P

Vulnerability Summary

Directus 8 prior to 8.8.2 allows remote authenticated users to execute arbitrary code because file-upload permissions include the ability to upload a .php file to the main upload directory and/or upload a .php file and a .htaccess file to a subdirectory. Exploitation succeeds only for certain installations with the Apache HTTP Server and the local-storage driver (e.g., when the product was obtained from hub.docker.com).

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

Exploits

Monospace Directus Headless CMS versions prior to 882 suffers from htaccess rule bypass and arbitrary file upload vulnerabilities ...