CVE-2024-54128: Directus has an HTML Injection in Comment
The Comment feature has implemented a filter to prevent users from adding restricted characters, such as HTML tags. However, this filter operates on the client-side, which can be bypassed, making the application vulnerable to HTML Injection.
References
- github.com/advisories/GHSA-r6wx-627v-gh2f
- github.com/directus/directus
- github.com/directus/directus/commit/4487fb18d5cb09e071b111d2dc0c9d6bcb437633
- github.com/directus/directus/commit/c89dbb233fbad2fd0cf41eb99d50c6de4e84195d
- github.com/directus/directus/security/advisories/GHSA-r6wx-627v-gh2f
- nvd.nist.gov/vuln/detail/CVE-2024-54128
Detect and mitigate CVE-2024-54128 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →