Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-0551— Download and export of file via default user role

EPSS 0.64% · P71
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2024-0551

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Download and export of file via default user role
Source: NVD (National Vulnerability Database)
Vulnerability Description
Enable exports of the database and associated exported information of the system via the default user role. The attacked would have to have been granted access to the system prior to the attack. It is worth noting that the deterministic nature of the export name is lower risk as the UI for exporting would start the download at the same time, which once downloaded - deletes the export from the system. The endpoint for exporting should simply be patched to a higher privilege level.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
访问控制不恰当
Source: NVD (National Vulnerability Database)
Vulnerability Title
AnythingLLM 访问控制错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
AnythingLLM是符合业务要求的文档聊天机器人。 AnythingLLM存在访问控制错误漏洞。攻击者利用该漏洞可以获得对系统的访问权限,并导出数据库信息。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
mintplex-labsmintplex-labs/anything-llm unspecified ~ 1.0.0 -

II. Public POCs for CVE-2024-0551

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2024-0551

登录查看更多情报信息。

Same Patch Batch · mintplex-labs · 2024-02-27 · 3 CVEs total

CVE-2024-0759Collection of internally resolving IPs
CVE-2024-0763Improper validation of document removal parameter

IV. Related Vulnerabilities

V. Comments for CVE-2024-0551

No comments yet


Leave a comment