2024-12-08 03:06:42 +00:00

64 lines
2.9 KiB
JSON

{
"id": "CVE-2024-3403",
"sourceIdentifier": "security@huntr.dev",
"published": "2024-05-16T09:15:14.053",
"lastModified": "2024-11-21T09:29:31.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "imartinez/privategpt version 0.2.0 is vulnerable to a local file inclusion vulnerability that allows attackers to read arbitrary files from the filesystem. By manipulating file upload functionality to ingest arbitrary local files, attackers can exploit the 'Search in Docs' feature or query the AI to retrieve or disclose the contents of any file on the system. This vulnerability could lead to various impacts, including but not limited to remote code execution by obtaining private SSH keys, unauthorized access to private files, source code disclosure facilitating further attacks, and exposure of configuration files."
},
{
"lang": "es",
"value": "imartinez/privategpt versi\u00f3n 0.2.0 es vulnerable a una vulnerabilidad de inclusi\u00f3n de archivos local que permite a los atacantes leer archivos arbitrarios del sistema de archivos. Al manipular la funcionalidad de carga de archivos para ingerir archivos locales arbitrarios, los atacantes pueden explotar la funci\u00f3n \"Buscar en Documentos\" o consultar la IA para recuperar o revelar el contenido de cualquier archivo en el sistema. Esta vulnerabilidad podr\u00eda provocar varios impactos, que incluyen, entre otros, la ejecuci\u00f3n remota de c\u00f3digo mediante la obtenci\u00f3n de claves SSH privadas, el acceso no autorizado a archivos privados, la divulgaci\u00f3n del c\u00f3digo fuente que facilita m\u00e1s ataques y la exposici\u00f3n de archivos de configuraci\u00f3n."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "security@huntr.dev",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security@huntr.dev",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://huntr.com/bounties/7431d1dd-f014-4d4f-acb6-f97369ef3688",
"source": "security@huntr.dev"
},
{
"url": "https://huntr.com/bounties/7431d1dd-f014-4d4f-acb6-f97369ef3688",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}