CVE-2024-8524

A directory traversal vulnerability exists in modelscope/agentscope version 0.0.4. An attacker can exploit this vulnerability to read any local JSON file by sending a crafted POST request to the /read-examples endpoint.
Configurations

Configuration 1 (hide)

cpe:2.3:a:modelscope:agentscope:0.0.4:*:*:*:*:*:*:*

History

01 Apr 2025, 20:31

Type Values Removed Values Added
References () https://huntr.com/bounties/cc4acf33-700d-4220-8a8a-db28f5c4cc8f - () https://huntr.com/bounties/cc4acf33-700d-4220-8a8a-db28f5c4cc8f - Exploit
CPE cpe:2.3:a:modelscope:agentscope:0.0.4:*:*:*:*:*:*:*
First Time Modelscope agentscope
Modelscope

20 Mar 2025, 15:15

Type Values Removed Values Added
References () https://huntr.com/bounties/cc4acf33-700d-4220-8a8a-db28f5c4cc8f - () https://huntr.com/bounties/cc4acf33-700d-4220-8a8a-db28f5c4cc8f -
Summary
  • (es) Existe una vulnerabilidad de directory traversal en modelscope/agentscope versión 0.0.4. Un atacante puede aprovechar esta vulnerabilidad para leer cualquier archivo JSON local enviando una solicitud POST manipulada al endpoint /read-examples.

20 Mar 2025, 10:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-03-20 10:15

Updated : 2025-04-01 20:31


NVD link : CVE-2024-8524

Mitre link : CVE-2024-8524

CVE.ORG link : CVE-2024-8524


JSON object : View

Products Affected

modelscope

  • agentscope
CWE
CWE-73

External Control of File Name or Path