CVE-2024-1879

A Cross-Site Request Forgery (CSRF) vulnerability in significant-gravitas/autogpt version v0.5.0 allows attackers to execute arbitrary commands on the AutoGPT server. The vulnerability stems from the lack of protections on the API endpoint receiving instructions, enabling an attacker to direct a user running AutoGPT in their local network to a malicious website. This site can then send crafted requests to the AutoGPT server, leading to command execution. The issue is exacerbated by CORS being enabled for arbitrary origins by default, allowing the attacker to read the response of all cross-site queries. This vulnerability was addressed in version 5.1.
Configurations

Configuration 1 (hide)

cpe:2.3:a:agpt:autogpt:0.5.0:*:*:*:*:*:*:*

History

21 Nov 2024, 08:51

Type Values Removed Values Added
References () https://github.com/significant-gravitas/autogpt/commit/26324f29849967fa72c207da929af612f1740669 - Patch () https://github.com/significant-gravitas/autogpt/commit/26324f29849967fa72c207da929af612f1740669 - Patch
References () https://huntr.com/bounties/125c2d0c-0481-4e5c-ae90-fec263acdf32 - Exploit, Third Party Advisory () https://huntr.com/bounties/125c2d0c-0481-4e5c-ae90-fec263acdf32 - Exploit, Third Party Advisory

24 Sep 2024, 13:54

Type Values Removed Values Added
CPE cpe:2.3:a:agpt:autogpt:0.5.0:*:*:*:*:*:*:*
First Time Agpt autogpt
Agpt
References () https://github.com/significant-gravitas/autogpt/commit/26324f29849967fa72c207da929af612f1740669 - () https://github.com/significant-gravitas/autogpt/commit/26324f29849967fa72c207da929af612f1740669 - Patch
References () https://huntr.com/bounties/125c2d0c-0481-4e5c-ae90-fec263acdf32 - () https://huntr.com/bounties/125c2d0c-0481-4e5c-ae90-fec263acdf32 - Exploit, Third Party Advisory

07 Jun 2024, 14:56

Type Values Removed Values Added
Summary
  • (es) Una vulnerabilidad de Cross-Site Request Forgery (CSRF) en la versión v0.5.0 de significant-gravitas/autogpt permite a los atacantes ejecutar comandos arbitrarios en el servidor AutoGPT. La vulnerabilidad se debe a la falta de protección en el endpoint API que recibe instrucciones, lo que permite a un atacante dirigir a un usuario que ejecuta AutoGPT en su red local a un sitio web malicioso. Luego, este sitio puede enviar solicitudes manipuladas al servidor AutoGPT, lo que lleva a la ejecución del comando. El problema se ve agravado por el hecho de que CORS está habilitado para orígenes arbitrarios de forma predeterminada, lo que permite al atacante leer la respuesta de todas las consultas entre sitios. Esta vulnerabilidad se solucionó en la versión 5.1.

06 Jun 2024, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-06 18:15

Updated : 2024-11-21 08:51


NVD link : CVE-2024-1879

Mitre link : CVE-2024-1879

CVE.ORG link : CVE-2024-1879


JSON object : View

Products Affected

agpt

  • autogpt
CWE
CWE-352

Cross-Site Request Forgery (CSRF)