Path Traversal: '.../...//' (CWE-35)
Mage AI allows remote users with the "Viewer" role to leak arbitrary files from the Mage server due to a path traversal in the "Pipeline Interaction" request
This vulnerability allows attackers with low-level privileges ("Viewer" role) to access and potentially exfiltrate sensitive files from the Mage server that they should not have access to. The confidentiality impact is high, as it could lead to unauthorized disclosure of sensitive information. However, there is no direct impact on the integrity or availability of the system.
There is no evidence that a public proof-of-concept exists. There is no evidence of proof of exploitation at the moment.
A patch is available. The vulnerability was addressed in a Github Advisory (GHSA-4mrc-w7jh-hx4j) published on August 23, 2024.
1. Update Mage AI to the latest patched version as soon as possible. 2. Implement the principle of least privilege, ensuring that users are only given the minimum necessary permissions. 3. Regularly audit user roles and access rights. 4. Implement additional access controls and input validation to prevent path traversal attacks. 5. Monitor for any suspicious file access patterns, especially from accounts with lower-level permissions.
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Feedly found the first article mentioning CVE-2024-45190. See article
Feedly estimated the CVSS score as MEDIUM
CVE-2024-45190 is part of a series of vulnerabilities related to Remote Arbitrary File Leaks, which may pose significant risks to affected systems. The criticality, exploitation status, CVSS score, proof-of-concept exploits, mitigations, detections, patches, and potential downstream impacts on third-party vendors or technology are not specified in the provided information. Further investigation is necessary to assess the full implications of this vulnerability. See article