This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis β
Q1What is this vulnerability? (Essence + Consequences)
π¨ **Essence**: FastGPT < 4.14.9.5 has a critical auth bypass. π₯ **Consequences**: Attackers can inject MongoDB operators via the password login endpoint.β¦
π‘οΈ **Root Cause**: CWE-943 (Improper Neutralization of Special Elements in Data). π **Flaw**: The login endpoint uses TypeScript type assertions without runtime checks.β¦
π **Public Exp?**: No specific PoC code provided in data. π **Status**: Advisory confirmed via GitHub Security Advisories (GHSA-x8mx-2mr7-h9xg). β οΈ **Risk**: High likelihood of wild exploitation due to low complexity.
β **Fixed**: Yes. π₯ **Patch**: Upgrade to **FastGPT v4.14.9.5** or later. π **Source**: Official GitHub Release & Commit bd966d479fbe414d02679cf79f9eaaab3d100a2d.
Q9What if no patch? (Workaround)
π§ **No Patch?**: Implement strict input validation on the login endpoint. π **Mitigate**: Block direct MongoDB query operator injection patterns. π **Limit**: Restrict network access to the login API if possible.β¦
π₯ **Urgency**: CRITICAL. π **CVSS**: 9.8 (High). π¨ **Action**: Patch IMMEDIATELY. This is an unauthenticated remote code execution equivalent. Do not delay.