cve/2024/CVE-2024-47170.md
2025-09-29 16:08:36 +00:00

18 lines
1.0 KiB
Markdown

### [CVE-2024-47170](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47170)
![](https://img.shields.io/static/v1?label=Product&message=agnai&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%201.0.330%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-35%3A%20Path%20Traversal%3A%20'...%2F...%2F%2F'&color=brighgreen)
### Description
Agnai is an artificial-intelligence-agnostic multi-user, mult-bot roleplaying chat system. A vulnerability in versions prior to 1.0.330 permits attackers to read arbitrary JSON files at attacker-chosen locations on the server. This issue can lead to unauthorized access to sensitive information and exposure of confidential configuration files. This only affects installations with `JSON_STORAGE` enabled which is intended to local/self-hosting only. Version 1.0.330 fixes this issue.
### POC
#### Reference
- https://github.com/agnaistic/agnai/security/advisories/GHSA-h355-hm5h-cm8h
#### Github
No PoCs found on GitHub currently.