In eosphoros-ai/db-gpt version v0.6.0, the web API `POST /api/v1/editor/chart/run` allows execution of arbitrary SQL queries without any access control. This vulnerability can be exploited by attackers to perform Arbitrary File Write, enabling them to write arbitrary files to the victim's file system. This can potentially lead to Remote Code Execution (RCE) by writing malicious files such as `__init__.py` in the Python's `/site-packages/` directory.
References
Link | Resource |
---|---|
https://huntr.com/bounties/db2c1d59-6e3a-4553-a1f6-94c8df162a18 | Exploit Third Party Advisory |
Configurations
History
17 Jul 2025, 13:40
Type | Values Removed | Values Added |
---|---|---|
First Time |
Dbgpt
Dbgpt db-gpt |
|
CPE | cpe:2.3:a:dbgpt:db-gpt:0.6.0:*:*:*:*:*:*:* | |
References | () https://huntr.com/bounties/db2c1d59-6e3a-4553-a1f6-94c8df162a18 - Exploit, Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
Summary |
|
20 Mar 2025, 10:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-03-20 10:15
Updated : 2025-07-17 13:40
NVD link : CVE-2024-10901
Mitre link : CVE-2024-10901
CVE.ORG link : CVE-2024-10901
JSON object : View
Products Affected
dbgpt
- db-gpt
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type