cve/2024/CVE-2024-11042.md

20 lines
1.0 KiB
Markdown
Raw Permalink Normal View History

2025-09-29 16:08:36 +00:00
### [CVE-2024-11042](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11042)
![](https://img.shields.io/static/v1?label=Product&message=invoke-ai%2Finvokeai&color=blue)
2025-09-29 21:09:30 +02:00
![](https://img.shields.io/static/v1?label=Version&message=unspecified%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-20%20Improper%20Input%20Validation&color=brightgreen)
2025-09-29 16:08:36 +00:00
### Description
In invoke-ai/invokeai version v5.0.2, the web API `POST /api/v1/images/delete` is vulnerable to Arbitrary File Deletion. This vulnerability allows unauthorized attackers to delete arbitrary files on the server, potentially including critical or sensitive system files such as SSH keys, SQLite databases, and configuration files. This can impact the integrity and availability of applications relying on these files.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/gothburz/CVE-2024-11042
2025-09-29 21:09:30 +02:00
- https://github.com/nomi-sec/PoC-in-GitHub
2025-09-29 16:08:36 +00:00
- https://github.com/plzheheplztrying/cve_monitor