cve/2024/CVE-2024-0455.md

18 lines
1.3 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2024-0455](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0455)
![](https://img.shields.io/static/v1?label=Product&message=mintplex-labs%2Fanything-llm&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=unspecified%3C%201.0.0%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)&color=brighgreen)
### Description
The inclusion of the web scraper for AnythingLLM means that any user with the proper authorization level (manager, admin, and when in single user) could put in the URL```http://169.254.169.254/latest/meta-data/identity-credentials/ec2/security-credentials/ec2-instance```which is a special IP and URL that resolves only when the request comes from within an EC2 instance. This would allow the user to see the connection/secret credentials for their specific instance and be able to manage it regardless of who deployed it.The user would have to have pre-existing knowledge of the hosting infra which the target instance is deployed on, but if sent - would resolve if on EC2 and the proper `iptable` or firewall rule is not configured for their setup.
### POC
#### Reference
- https://huntr.com/bounties/07d83b49-7ebb-40d2-83fc-78381e3c5c9c
#### Github
No PoCs found on GitHub currently.