CVE-2024-47169

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') (CWE-22)

Published: Sep 26, 2024

010
CVSS 8.8EPSS 0.04%High
CVE info copied to clipboard

Summary

A vulnerability in Agnai allows attackers to upload arbitrary files, including JavaScript, to attacker-chosen locations on the server. This enables the execution of commands within those files.

Impact

This vulnerability could result in unauthorized access, full server compromise, data leakage, and other critical security threats. The impact is severe, with high confidentiality, integrity, and availability impacts. Attackers can potentially gain control over the server, execute arbitrary code, and access or modify sensitive data.

Exploitation

There is no evidence that a public proof-of-concept exists. There is no evidence of proof of exploitation at the moment.

Patch

A patch is available. The vulnerability was patched on September 26, 2024, as indicated by the patch details from the Github Advisory.

Mitigation

1. Update to the latest patched version of Agnai immediately. 2. If immediate patching is not possible, consider the following: - Use S3-compatible storage for installations, as these are not affected. - Ensure self-hosted installations are not publicly exposed. - Implement strict input validation and file upload restrictions. - Monitor for any suspicious file uploads or unexpected server behavior. 3. Regularly audit and restrict file upload functionalities. 4. Implement principle of least privilege for server processes. 5. Use Web Application Firewalls (WAF) to help detect and block malicious requests.

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Timeline

Vendor Advisory

GitHub Advisories released a security advisory.

Sep 26, 2024 at 5:01 AM
Detection in Vulnerability Scanners

Detection for the vulnerability has been added to Qualys (5001097)

Sep 26, 2024 at 7:53 AM
First Article

Feedly found the first article mentioning CVE-2024-47169. See article

Sep 26, 2024 at 6:12 PM / GitHub Advisory Database
CVSS Estimate

Feedly estimated the CVSS score as HIGH

Sep 26, 2024 at 6:12 PM
CVE Assignment

NVD published the first details for CVE-2024-47169

Sep 26, 2024 at 6:15 PM
CVSS

A CVSS base score of 8.8 has been assigned.

Sep 26, 2024 at 6:20 PM / nvd
EPSS

EPSS Score was set to: 0.04% (Percentile: 9.6%)

Sep 27, 2024 at 9:37 AM
Static CVE Timeline Graph

Affected Systems

Agnai/agnai
+null more

Patches

Github Advisory
+null more

Links to Mitre Att&cks

T1574.010: Services File Permissions Weakness
+null more

Attack Patterns

CAPEC-126: Path Traversal
+null more

Vendor Advisory

[GHSA-mpch-89gm-hm83] Agnai vulnerable to Remote Code Execution via JS Upload using Directory Traversal
A vulnerability has been discovered in Agnai that permits attackers to upload arbitrary files to attacker-chosen locations on the server, including JavaScript, enabling the execution of commands within those files. Attackers can gain full access to the server.

News

cveNotify : 🚨 CVE-2024-47169Agnai is an artificial-intelligence-agnostic multi-user, mult-bot roleplaying chat system. A vulnerability in versions prior to 1.0.330 permits attackers to upload arbitrary files to attacker-chosen locations on the server, including JavaScript, enabling the execution of commands within those files. This issue could result in unauthorized access, full server compromise, data leakage, and other critical security threats. This does not affect `agnai.chat`, installations using S3-compatible storage, or self-hosting that is not publicly exposed. This does affect publicly hosted installs without S3-compatible storage. Version 1.0.330 fixes this vulnerability.🎖@cveNotify
cveNotify : 🚨 CVE-2024-47169Agnai is an artificial-intelligence-agnostic multi-user, mult-bot roleplaying chat system. A vulnerability in versions prior to 1.0.330 permits attackers to upload arbitrary files to attacker-chosen locations on the server, including JavaScript, enabling the execution of commands within those files. This issue could result in unauthorized access, full server compromise, data leakage, and other critical security threats. This does not affect `agnai.chat`, installations using S3-compatible storage, or self-hosting that is not publicly exposed. This does affect publicly hosted installs without S3-compatible storage. Version 1.0.330 fixes this vulnerability.🎖@cveNotify
Security Bulletin 02 Oct 2024 - Cyber Security Agency of Singapore
This makes it possible for authenticated attackers, with Contributor-level access and above, to append additional SQL queries into already existing ...
CVE-2024-47169
High Severity Description Agnai is an artificial-intelligence-agnostic multi-user, mult-bot roleplaying chat system. A vulnerability in versions prior to 1.0.330 permits attackers to upload arbitrary files to attacker-chosen locations on the server, including JavaScript, enabling the execution of commands within those files. This issue could result in unauthorized access, full server compromise, data leakage, and other critical security threats. This does not affect `agnai.chat`, installations using S3-compatible storage, or self-hosting that is not publicly exposed. This does affect publicly hosted installs without S3-compatible storage. Version 1.0.330 fixes this vulnerability. Read more at https://www.tenable.com/cve/CVE-2024-47169
CVE-2024-47169
A vulnerability in versions prior to 1.0.330 permits attackers to upload arbitrary files to attacker-chosen locations on the server, including JavaScript, enabling the execution of commands within those files. This does not affect `agnai.chat`, installations using S3-compatible storage, or self-hosting that is not publicly exposed.
NA - CVE-2024-47169 - Agnai is an artificial-intelligence-agnostic...
Agnai is an artificial-intelligence-agnostic multi-user, mult-bot roleplaying chat system. A vulnerability in versions prior to 1.0.330 permits attackers to upload arbitrary files to...
See 8 more articles and social media posts

CVSS V3.1

Attack Vector:Network
Attack Complexity:Low
Privileges Required:Low
User Interaction:None
Scope:Unchanged
Confidentiality:High
Integrity:High
Availability Impact:High

Categories

Be the first to know about critical vulnerabilities

Collect, analyze, and share vulnerability reports faster using AI