The Directus process can be aborted by having an authorized user update the filename_disk value to a folder and accessing that file through the /assets endpoint.
The vulnerability is patched and released in v9.15.0.
You can prevent this problem by making sure no (untrusted) non-admin users have permissions to update the filename_disk field on directus_files.
If you have any questions or comments about this advisory: * Open a Discussion in directus/directus * Email us at security@directus.io
This vulnerability was first discovered and reported by Witold Gorecki.
{
"cwe_ids": [
"CWE-755"
],
"github_reviewed": true,
"github_reviewed_at": "2022-08-30T20:18:48Z",
"severity": "MODERATE",
"nvd_published_at": "2022-08-19T21:15:00Z"
}