CVE-2024-3152 Vulnerability Details

  /     /     /  

CVE-2024-3152 Metadata Quick Info

CVE Published: 06/06/2024 | CVE Updated: 14/11/2024 | CVE Year: 2024
Source: @huntr_ai | Vendor: mintplex-labs | Product: mintplex-labs/anything-llm
Status : PUBLISHED

CVE-2024-3152 Description

mintplex-labs/anything-llm is vulnerable to multiple security issues due to improper input validation in several endpoints. An attacker can exploit these vulnerabilities to escalate privileges from a default user role to an admin role, read and delete arbitrary files on the system, and perform Server-Side Request Forgery (SSRF) attacks. The vulnerabilities are present in the `/request-token`, `/workspace/:slug/thread/:threadSlug/update`, `/system/remove-logo`, `/system/logo`, and collector\'s `/process` endpoints. These issues are due to the application\'s failure to properly validate user input before passing it to `prisma` functions and other critical operations. Affected versions include the latest version prior to 1.0.0.

Metrics

CVSS Version: 3.1 | Base Score: n/a
Vector: n/a

l➤ Exploitability Metrics:
    Attack Vector (AV)*
    Attack Complexity (AC)*
    Privileges Required (PR)*
    User Interaction (UI)*
    Scope (S)*

l➤ Impact Metrics:
    Confidentiality Impact (C)*
    Integrity Impact (I)*
    Availability Impact (A)*

Weakness Enumeration (CWE)

CWE-ID: CWE-755
CWE Name: CWE-755 Improper Handling of Exceptional Conditions
Source: mintplex-labs

Common Attack Pattern Enumeration and Classification (CAPEC)

CAPEC-ID:
CAPEC Description:


Source: NVD (National Vulnerability Database).