A Server-Side Request Forgery (SSRF) vulnerability exists in the file upload section of imartinez/privategpt version 0.5.0. This vulnerability allows attackers to send crafted requests that could result in unauthorized access to the local network and potentially sensitive information. Specifically, by manipulating the 'path' parameter in a file upload request, an attacker can cause the application to make arbitrary requests to internal services, including the AWS metadata endpoint. This issue could lead to the exposure of internal servers and sensitive data.
References
Link | Resource |
---|---|
https://huntr.com/bounties/5f421645-3546-4a67-a421-ee1bc4b6e3a3 | Exploit Third Party Advisory |
Configurations
History
24 Sep 2024, 14:04
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.6 |
First Time |
Zylon
Zylon privategpt |
|
References | () https://huntr.com/bounties/5f421645-3546-4a67-a421-ee1bc4b6e3a3 - Exploit, Third Party Advisory | |
CPE | cpe:2.3:a:zylon:privategpt:0.5.0:*:*:*:*:*:*:* |
07 Jun 2024, 14:56
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
06 Jun 2024, 19:16
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-06-06 19:16
Updated : 2024-09-24 14:04
NVD link : CVE-2024-5186
Mitre link : CVE-2024-5186
CVE.ORG link : CVE-2024-5186
JSON object : View
Products Affected
zylon
- privategpt
CWE
CWE-918
Server-Side Request Forgery (SSRF)