First published: Thu Mar 20 2025(Updated: )
A Path Traversal vulnerability exists in the eosphoros-ai/db-gpt version 0.6.0 at the API endpoint `/v1/resource/file/delete`. This vulnerability allows an attacker to delete any file on the server by manipulating the `file_key` parameter. The `file_key` parameter is not properly sanitized, enabling an attacker to specify arbitrary file paths. If the specified file exists, the application will delete it.
Credit: security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
eosphoros-ai db-gpt | ||
pip/dbgpt | <=0.6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-10830 is high due to its ability to allow attackers to delete arbitrary files on the server.
To fix CVE-2024-10830, validate and sanitize the `file_key` parameter thoroughly to prevent path traversal exploits.
CVE-2024-10830 affects eosphoros-ai/db-gpt version 0.6.0.
The impact of CVE-2024-10830 allows unauthorized deletion of files, which can lead to data loss and system instability.
An attacker can exploit CVE-2024-10830 by manipulating the `file_key` parameter in the API endpoint `/v1/resource/file/delete` to delete files.