A broken access control vulnerability was identified in the Directus file management API that allows authenticated users to overwrite files belonging to other users by manipulating the filename_disk parameter.
The PATCH /files/{id} endpoint accepts a user-controlled filename_disk parameter. By setting this value to match the storage path of another user's file, an attacker can overwrite that file's content while manipulating metadata fields such as uploaded_by to obscure the tampering.
The filename_disk parameter should be treated as a server-controlled value. Uniqueness of storage paths must be enforced server-side, and filename_disk should be excluded from the fields users are permitted to update directly.
11.17.0Exploitability
AV:NAC:LPR:LUI:NScope
S:CImpact
C:LI:HA:N8.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N