Lucene search

K
cvelistGitHub_MCVELIST:CVE-2023-37273
HistoryJul 13, 2023 - 10:33 p.m.

CVE-2023-37273 Docker escape in Auto-GPT when running from docker-compose.yml included in git repo

2023-07-1322:33:16
CWE-94
GitHub_M
www.cve.org
2
cve-2023-37273
docker escape
auto-gpt
gpt-4
git repo
docker-compose.yml
write protection
python code
host system
patch

CVSS3

8.1

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

LOW

CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:L

AI Score

9.2

Confidence

High

EPSS

0

Percentile

9.0%

Auto-GPT is an experimental open-source application showcasing the capabilities of the GPT-4 language model. Running Auto-GPT version prior to 0.4.3 by cloning the git repo and executing docker compose run auto-gpt in the repo root uses a different docker-compose.yml file from the one suggested in the official docker set up instructions. The docker-compose.yml file located in the repo root mounts itself into the docker container without write protection. This means that if malicious custom python code is executed via the execute_python_file and execute_python_code commands, it can overwrite the docker-compose.yml file and abuse it to gain control of the host system the next time Auto-GPT is started. The issue has been patched in version 0.4.3.

CNA Affected

[
  {
    "vendor": "Significant-Gravitas",
    "product": "Auto-GPT",
    "versions": [
      {
        "version": "< 0.4.3",
        "status": "affected"
      }
    ]
  }
]

CVSS3

8.1

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

LOW

CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:L

AI Score

9.2

Confidence

High

EPSS

0

Percentile

9.0%

Related for CVELIST:CVE-2023-37273