SuperAGI version v0.0.14 is vulnerable to an unauthenticated Denial of Service (DoS) attack. The vulnerability exists in the resource upload request, where appending characters, such as dashes (-), to the end of a multipart boundary in an HTTP request causes the server to continuously process each character. This leads to excessive resource consumption and renders the service unavailable. The issue is unauthenticated and does not require any user interaction, impacting all users of the service.
References
Link | Resource |
---|---|
https://huntr.com/bounties/27404e9c-eb3d-4626-a9d9-8dc1b3295ce0 | Exploit Third Party Advisory |
Configurations
History
14 Jul 2025, 20:17
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
First Time |
Superagi
Superagi superagi |
|
CPE | cpe:2.3:a:superagi:superagi:0.0.14:*:*:*:*:*:*:* | |
References | () https://huntr.com/bounties/27404e9c-eb3d-4626-a9d9-8dc1b3295ce0 - Exploit, Third Party Advisory |
20 Mar 2025, 10:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-03-20 10:15
Updated : 2025-07-14 20:17
NVD link : CVE-2024-9437
Mitre link : CVE-2024-9437
CVE.ORG link : CVE-2024-9437
JSON object : View
Products Affected
superagi
- superagi
CWE
CWE-400
Uncontrolled Resource Consumption