// For flags

CVE-2024-5213

Exposure of Sensitive Information in mintplex-labs/anything-llm

Severity Score

5.3
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track
*SSVC
Descriptions

In mintplex-labs/anything-llm versions up to and including 1.5.3, an issue was discovered where the password hash of a user is returned in the response after login (`POST /api/request-token`) and after account creations (`POST /api/admin/users/new`). This exposure occurs because the entire User object, including the bcrypt password hash, is included in the response sent to the frontend. This practice could potentially lead to sensitive information exposure despite the use of bcrypt, a strong hashing algorithm. It is recommended not to expose any clues about passwords to the frontend.

En las versiones de mintplex-labs/anything-llm hasta la 1.5.3 incluida, se descubrió un problema por el cual el hash de la contraseña de un usuario se devuelve en la respuesta después de iniciar sesión (`POST /api/request-token`) y después de la creación de la cuenta. (`POST /api/admin/usuarios/nuevo`). Esta exposición se produce porque todo el objeto Usuario, incluido el hash de la contraseña de bcrypt, se incluye en la respuesta enviada al frontend. Esta práctica podría conducir potencialmente a la exposición de información confidencial a pesar del uso de bcrypt, un potente algoritmo hash. Se recomienda no exponer ninguna pista sobre contraseñas en la interfaz.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
High
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
Single
Confidentiality
Complete
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:Track
Exploitation
None
Automatable
No
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2024-05-22 CVE Reserved
  • 2024-06-20 CVE Published
  • 2024-08-01 CVE Updated
  • 2025-04-16 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-1230: Exposure of Sensitive Information Through Metadata
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Mintplexlabs
Search vendor "Mintplexlabs"
Anythingllm
Search vendor "Mintplexlabs" for product "Anythingllm"
*-
Affected