First published: Thu Mar 20 2025(Updated: )
In eosphoros-ai/db-gpt version v0.6.0, the web API `POST /v1/personal/agent/upload` is vulnerable to Arbitrary File Upload with Path Traversal. This vulnerability allows unauthorized attackers to upload arbitrary files to the victim's file system at any location. The impact of this vulnerability includes the potential for remote code execution (RCE) by writing malicious files, such as a malicious `__init__.py` in the Python's `/site-packages/` directory.
Credit: security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
eosphoros-ai db-gpt | ||
pip/dbgpt | <=0.6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-10902 is rated as a critical severity vulnerability due to its potential for arbitrary file uploads.
To mitigate CVE-2024-10902, implement proper input validation and restrict file upload functionality to only allow safe file types.
CVE-2024-10902 affects users of eosphoros-ai/db-gpt version v0.6.0 and prior.
CVE-2024-10902 is classified as an Arbitrary File Upload vulnerability with Path Traversal.
CVE-2024-10902 could allow attackers to upload malicious files to arbitrary locations in the victim's file system.