CVE-2024-3152
Privilege Escalation and Local File Inclusion in mintplex-labs/anything-llm
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
mintplex-labs/anything-llm is vulnerable to multiple security issues due to improper input validation in several endpoints. An attacker can exploit these vulnerabilities to escalate privileges from a default user role to an admin role, read and delete arbitrary files on the system, and perform Server-Side Request Forgery (SSRF) attacks. The vulnerabilities are present in the `/request-token`, `/workspace/:slug/thread/:threadSlug/update`, `/system/remove-logo`, `/system/logo`, and collector's `/process` endpoints. These issues are due to the application's failure to properly validate user input before passing it to `prisma` functions and other critical operations. Affected versions include the latest version prior to 1.0.0.
mintplex-labs/anything-llm es vulnerable a múltiples problemas de seguridad debido a una validación de entrada incorrecta en varios endpoints. Un atacante puede aprovechar estas vulnerabilidades para escalar privilegios de una función de usuario predeterminada a una función de administrador, leer y eliminar archivos arbitrarios en el sistema y realizar ataques de Server-Side Request Forgery (SSRF). Las vulnerabilidades están presentes en `/request-token`, `/workspace/:slug/thread/:threadSlug/update`, `/system/remove-logo`, `/system/logo`, and collector's `/process` endpoints. Estos problemas se deben a que la aplicación no valida adecuadamente la entrada del usuario antes de pasarla a las funciones "prisma" y otras operaciones críticas. Las versiones afectadas incluyen la última versión anterior a 1.0.0.
CVSS Scores
SSVC
- Decision:Attend
Timeline
- 2024-04-01 CVE Reserved
- 2024-06-06 CVE Published
- 2024-11-14 CVE Updated
- 2025-07-15 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-20: Improper Input Validation
- CWE-755: Improper Handling of Exceptional Conditions
CAPEC
References (2)
URL | Tag | Source |
---|---|---|
https://github.com/mintplex-labs/anything-llm/commit/200bd7f0615347ed2efc07903d510e5a208b0afc | ||
https://huntr.com/bounties/46034fa0-d623-49f8-8ee8-390390181373 |
|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Mintplexlabs Search vendor "Mintplexlabs" | Anythingllm Search vendor "Mintplexlabs" for product "Anythingllm" | * | - |
Affected
|