Lucene search

K
cve@huntr_aiCVE-2024-3028
HistoryApr 16, 2024 - 12:15 a.m.

CVE-2024-3028

2024-04-1600:15:11
CWE-20
@huntr_ai
web.nvd.nist.gov
33
cve-2024-3028
improper input validation
arbitrary files read
delete attack
'logo_filename' parameter
'system-preferences' api
sensitive files access
'.env' file
remove-logo api
lack of input sanitization
nvd

CVSS3

7.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

AI Score

6.9

Confidence

High

EPSS

0

Percentile

9.0%

mintplex-labs/anything-llm is vulnerable to improper input validation, allowing attackers to read and delete arbitrary files on the server. By manipulating the ‘logo_filename’ parameter in the ‘system-preferences’ API endpoint, an attacker can construct requests to read sensitive files or the application’s ‘.env’ file, and even delete files by setting the ‘logo_filename’ to the path of the target file and invoking the ‘remove-logo’ API endpoint. This vulnerability is due to the lack of proper sanitization of user-supplied input.

Affected configurations

Vulners
Vulnrichment
Node
mintplex-labsmintplex-labs\/anything-llmMatch1.0.0
VendorProductVersionCPE
mintplex-labsmintplex-labs\/anything-llm1.0.0cpe:2.3:a:mintplex-labs:mintplex-labs\/anything-llm:1.0.0:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "mintplex-labs",
    "product": "mintplex-labs/anything-llm",
    "versions": [
      {
        "version": "unspecified",
        "lessThan": "1.0.0",
        "status": "affected",
        "versionType": "custom"
      }
    ]
  }
]

CVSS3

7.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

AI Score

6.9

Confidence

High

EPSS

0

Percentile

9.0%

Related for CVE-2024-3028