In eosphoros-ai/db-gpt version v0.6.0, the web API `POST /v1/personal/agent/upload` is vulnerable to Arbitrary File Upload with Path Traversal. This vulnerability allows unauthorized attackers to upload arbitrary files to the victim's file system at any location. The impact of this vulnerability includes the potential for remote code execution (RCE) by writing malicious files, such as a malicious `__init__.py` in the Python's `/site-packages/` directory.
References
Link | Resource |
---|---|
https://huntr.com/bounties/f7fbf76e-aa1c-4106-b007-e9579f4f7d5f | Exploit Third Party Advisory |
Configurations
History
17 Jul 2025, 13:41
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:dbgpt:db-gpt:0.6.0:*:*:*:*:*:*:* | |
Summary |
|
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
First Time |
Dbgpt
Dbgpt db-gpt |
|
References | () https://huntr.com/bounties/f7fbf76e-aa1c-4106-b007-e9579f4f7d5f - Exploit, Third Party Advisory |
20 Mar 2025, 10:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-03-20 10:15
Updated : 2025-07-17 13:41
NVD link : CVE-2024-10902
Mitre link : CVE-2024-10902
CVE.ORG link : CVE-2024-10902
JSON object : View
Products Affected
dbgpt
- db-gpt
CWE
CWE-73
External Control of File Name or Path