THREATINT

We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Fathom (Privacy friendly web analytics)
Zendesk (Helpdesk and Chat)

Ok

Home | EN
Support
CVE
PUBLISHED

CVE-2024-3152

Privilege Escalation and Local File Inclusion in mintplex-labs/anything-llm

Assigner@huntr_ai
Reserved2024-04-01
Published2024-06-06
Updated2024-06-06

Description

mintplex-labs/anything-llm is vulnerable to multiple security issues due to improper input validation in several endpoints. An attacker can exploit these vulnerabilities to escalate privileges from a default user role to an admin role, read and delete arbitrary files on the system, and perform Server-Side Request Forgery (SSRF) attacks. The vulnerabilities are present in the `/request-token`, `/workspace/:slug/thread/:threadSlug/update`, `/system/remove-logo`, `/system/logo`, and collector's `/process` endpoints. These issues are due to the application's failure to properly validate user input before passing it to `prisma` functions and other critical operations. Affected versions include the latest version prior to 1.0.0.



HIGH: 8.8CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-20 Improper Input Validation

Product status

Any version before 1.0.0
affected

References

https://huntr.com/bounties/46034fa0-d623-49f8-8ee8-390390181373

https://github.com/mintplex-labs/anything-llm/commit/200bd7f0615347ed2efc07903d510e5a208b0afc

cve.org CVE-2024-3152

nvd.nist.gov CVE-2024-3152

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-3152
© Copyright 2024 THREATINT. Made in Cyprus with +