First published: Thu Mar 20 2025(Updated: )
In version 0.6.0 of eosphoros-ai/db-gpt, the `uvicorn` app created by `dbgpt_server` uses an overly permissive instance of `CORSMiddleware` which sets the `Access-Control-Allow-Origin` to `*` for all requests. This configuration makes all endpoints exposed by the server vulnerable to Cross-Site Request Forgery (CSRF). An attacker can exploit this vulnerability to interact with any endpoints of the instance, even if the instance is not publicly exposed to the network.
Credit: security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
eosphoros-ai db-gpt | ||
pip/dbgpt | <=0.6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-10906 is classified as a high-severity vulnerability due to its potential for unauthorized access to all endpoints.
To fix CVE-2024-10906, update the CORS middleware configuration to restrict the `Access-Control-Allow-Origin` header to trusted origins.
CVE-2024-10906 affects eosphoros-ai/db-gpt version 0.6.0 and below.
CVE-2024-10906 exposes the application to cross-origin resource sharing (CORS) vulnerabilities, allowing malicious sites to access sensitive data.
The main cause of CVE-2024-10906 is the use of an overly permissive instance of `CORSMiddleware` that allows all origins.