First published: Thu Mar 20 2025(Updated: )
In eosphoros-ai/db-gpt version v0.6.0, the web API `POST /api/v1/editor/chart/run` allows execution of arbitrary SQL queries without any access control. This vulnerability can be exploited by attackers to perform Arbitrary File Write, enabling them to write arbitrary files to the victim's file system. This can potentially lead to Remote Code Execution (RCE) by writing malicious files such as `__init__.py` in the Python's `/site-packages/` directory.
Credit: security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
eosphoros-ai db-gpt | ||
pip/dbgpt | <=0.6.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-10901 is considered a critical vulnerability due to its potential for arbitrary SQL execution and file write capabilities.
To mitigate CVE-2024-10901, it is recommended to immediately apply access controls to the API endpoint and validate SQL inputs.
The impact of CVE-2024-10901 includes potential unauthorized access to sensitive data and the ability for attackers to modify files on the server.
CVE-2024-10901 affects version v0.6.0 of eosphoros-ai/db-gpt.
Yes, CVE-2024-10901 can be exploited remotely through the vulnerable API without requiring prior access.