Exploit
CVE-2024-8865

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') (CWE-22)

Published: Sep 15, 2024 / Updated: 2mo ago

010
CVSS 5.1EPSS 0.05%Medium
CVE info copied to clipboard

Summary

A vulnerability classified as problematic was discovered in composiohq composio versions up to 0.5.8. The issue affects the function path of the file composio\server\api.py. Manipulation of the argument file can lead to path traversal.

Impact

This vulnerability allows an attacker to potentially access files and directories that are outside of the intended directory structure. This could lead to unauthorized access to sensitive information, system files, or other critical data stored on the server. The confidentiality impact is rated as HIGH, while integrity and availability impacts are rated as NONE.

Exploitation

One proof-of-concept exploit is available on notion.site. There is no evidence of proof of exploitation at the moment.

Patch

As of the latest information provided, no specific patch has been mentioned. The vendor was contacted about this disclosure but did not respond.

Mitigation

1. Upgrade composiohq composio to a version newer than 0.5.8 if available. 2. Implement strong input validation and sanitization for file paths. 3. Use a whitelist of allowed file paths and restrict access to only necessary directories. 4. Implement the principle of least privilege for file system access. 5. Monitor and log file access attempts for suspicious activity. 6. Consider implementing additional security measures such as Web Application Firewalls (WAF) to help detect and prevent path traversal attempts.

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N

CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Timeline

First Article

Feedly found the first article mentioning CVE-2024-8865. See article

Sep 15, 2024 at 1:12 AM / Vulners.com RSS Feed
CVSS Estimate

Feedly estimated the CVSS score as MEDIUM

Sep 15, 2024 at 1:12 AM
CVE Assignment

NVD published the first details for CVE-2024-8865

Sep 15, 2024 at 1:15 AM
CVSS

A CVSS base score of 3.5 has been assigned.

Sep 15, 2024 at 1:20 AM / nvd
CVSS Estimate

Feedly estimated the CVSS score as HIGH

Sep 15, 2024 at 1:57 AM
EPSS

EPSS Score was set to: 0.05% (Percentile: 16.3%)

Sep 15, 2024 at 12:06 PM
CVSS

A CVSS base score of 4.9 has been assigned.

Sep 17, 2024 at 10:55 AM / nvd
Proof of Concept (PoC) Released

A proof of concept exploit has been released

Sep 17, 2024 at 2:10 PM
CVSS

A CVSS base score of 4.9 has been assigned.

Sep 17, 2024 at 2:10 PM / nvd
Static CVE Timeline Graph

Affected Systems

Composio/composio
+null more

Exploits

https://rumbling-slice-eb0.notion.site/There-is-an-arbitrary-file-read-vulnerability-at-api-download-in-composiohq-composio-f0ec1ec26a5f434a97bb1ffde435a35b?pvs=4
+null more

Attack Patterns

CAPEC-126: Path Traversal
+null more

News

CVE-2024-8865 Exploit
CVE Id : CVE-2024-8865 Published Date: 2024-09-17T10:50:00+00:00 A vulnerability was found in composiohq composio up to 0.5.8 and classified as problematic. Affected by this issue is the function path of the file composio\server\api.py. The manipulation of the argument file leads to path traversal. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. inTheWild added a link to an exploit: https://rumbling-slice-eb0.notion.site/There-is-an-arbitrary-file-read-vulnerability-at-api-download-in-composiohq-composio-f0ec1ec26a5f434a97bb1ffde435a35b?pvs=4
Recent vulnerabilities
Vulnerabilities are sorted by update time (recent to old). ID Description ghsa-jf5x-p6mg-vvp7 ( github ) TOTOLINK AC1200 T8 v4.1.5cu.861_B20230220 has a buffer overflow vulnerability in the setWizardCfg function via the ssid5g parameter. ghsa-hh55-xqjj-vxv4 ( github ) TOTOLINK AC1200 T8 v4.1.5cu.861_B20230220 has a buffer overflow vulnerability in the UploadCustomModule function, which allows attackers to cause a Denial of Service (DoS) via the File parameter. ghsa-f2jm-rw3h-6phg ( github ) A vulnerability in the FAISS.deserialize_from_bytes function of langchain-ai/langchain allows for pickle deserialization of untrusted data. This can lead to the execution of arbitrary commands via the os.system function. The issue affects the latest version of the product. ghsa-8q4v-68hv-v55c ( github ) In the Linux kernel, the following vulnerability has been resolved: netfilter: nfnetlink: Initialise extack before use in ACKs Add missing extack initialisation when ACKing BATCH_BEGIN and BATCH_END.
CVE-2024-8865
A vulnerability was found in composiohq composio up to 0.5.8 and classified as problematic. Affected by this issue is the function path of the file composio\server\api.py. The manipulation of the argument file leads to path traversal. The exploit has been disclosed to the public and may be used. The CVE-2024-8865 originally published on CyberSecurityBoard
CVE-2024-8865
Affected by this issue is the function path of the file composio\server\api.py. Gravedad 3.1 (CVSS 3.1 Base Score)
NA - CVE-2024-8865 - A vulnerability was found in composiohq...
A vulnerability was found in composiohq composio up to 0.5.8 and classified as problematic. Affected by this issue is the function path of the file composio\server\api.py. The manipulation of the...
See 9 more articles and social media posts

CVSS V3.1

Attack Vector:Network
Attack Complexity:Low
Privileges Required:High
User Interaction:None
Scope:Unchanged
Confidentiality:High
Integrity:None
Availability Impact:None

Categories

Be the first to know about critical vulnerabilities

Collect, analyze, and share vulnerability reports faster using AI