CVE-2024-3104
Remote Code Execution in mintplex-labs/anything-llm
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
A remote code execution vulnerability exists in mintplex-labs/anything-llm due to improper handling of environment variables. Attackers can exploit this vulnerability by injecting arbitrary environment variables via the `POST /api/system/update-env` endpoint, which allows for the execution of arbitrary code on the host running anything-llm. The vulnerability is present in the latest version of anything-llm, with the latest commit identified as fde905aac1812b84066ff72e5f2f90b56d4c3a59. This issue has been fixed in version 1.0.0. Successful exploitation could lead to code execution on the host, enabling attackers to read and modify data accessible to the user running the service, potentially leading to a denial of service.
Existe una vulnerabilidad de ejecución remota de código en mintplex-labs/anything-llm debido al manejo inadecuado de las variables de entorno. Los atacantes pueden explotar esta vulnerabilidad inyectando variables de entorno arbitrarias a través del endpoint `POST /api/system/update-env`, que permite la ejecución de código arbitrario en el host que ejecuta cualquier cosa-llm. La vulnerabilidad está presente en la última versión de everything-llm, con el ultimo commit identificada como fde905aac1812b84066ff72e5f2f90b56d4c3a59. Este problema se solucionó en la versión 1.0.0. Una explotación exitosa podría conducir a la ejecución de código en el host, lo que permitiría a los atacantes leer y modificar datos accesibles para el usuario que ejecuta el servicio, lo que podría conducir a una denegación de servicio.
CVSS Scores
SSVC
- Decision:Attend
Timeline
- 2024-03-29 CVE Reserved
- 2024-06-06 CVE Published
- 2024-08-01 CVE Updated
- 2025-04-15 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CAPEC
References (2)
URL | Tag | Source |
---|---|---|
https://github.com/mintplex-labs/anything-llm/commit/bfedfebfab032e6f4d5a369c8a2f947c5d0c5286 | ||
https://huntr.com/bounties/4f2fcb45-5828-4bec-985a-9d3a0ee00462 |
|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Mintplexlabs Search vendor "Mintplexlabs" | Anythingllm Search vendor "Mintplexlabs" for product "Anythingllm" | * | - |
Affected
|