Use of GET Request Method With Sensitive Query Strings in Directus - CVE-2024-28238
Published: March 12, 2024 / Updated: April 23, 2026
Directus
Directus
Description
The vulnerability allows a local privileged user to disclose sensitive information.
The vulnerability exists due to use of get request method with sensitive query strings in the /files page when passing a jwt via a get request. A local privileged user can access logged urls containing the session token to disclose sensitive information.
URLs may be stored in web server logs and browser history, which can expose active session tokens.