2024-12-15 03:03:56 +00:00

105 lines
4.0 KiB
JSON

{
"id": "CVE-2024-47169",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-09-26T18:15:10.157",
"lastModified": "2024-10-30T18:25:39.783",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Agnai is an artificial-intelligence-agnostic multi-user, mult-bot roleplaying chat system. A vulnerability in versions prior to 1.0.330 permits attackers to upload arbitrary files to attacker-chosen locations on the server, including JavaScript, enabling the execution of commands within those files. This issue could result in unauthorized access, full server compromise, data leakage, and other critical security threats. This does not affect `agnai.chat`, installations using S3-compatible storage, or self-hosting that is not publicly exposed. This does affect publicly hosted installs without S3-compatible storage. Version 1.0.330 fixes this vulnerability."
},
{
"lang": "es",
"value": "Agnai es un sistema de chat multiusuario y multibot que juega roles y que no depende de la inteligencia artificial. Una vulnerabilidad en las versiones anteriores a la 1.0.330 permite a los atacantes cargar archivos arbitrarios en las ubicaciones elegidas por el atacante en el servidor, incluido JavaScript, lo que permite la ejecuci\u00f3n de comandos dentro de esos archivos. Este problema podr\u00eda provocar acceso no autorizado, compromiso total del servidor, fuga de datos y otras amenazas de seguridad cr\u00edticas. Esto no afecta a `agnai.chat`, instalaciones que utilizan almacenamiento compatible con S3 o alojamiento propio que no est\u00e1 expuesto p\u00fablicamente. Esto s\u00ed afecta a las instalaciones alojadas p\u00fablicamente sin almacenamiento compatible con S3. La versi\u00f3n 1.0.330 corrige esta vulnerabilidad."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-35"
},
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:agnai:agnai:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.0.330",
"matchCriteriaId": "018F1D62-64B1-4A69-BC8B-37565BF64656"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/agnaistic/agnai/security/advisories/GHSA-mpch-89gm-hm83",
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
}
]
}