Should an instance of AnythingLLM be hosted on an internal network and the attacked be explicitly granted a permission level of manager or admin, they could link-scrape internally resolving IPs of other services that are on the same network as AnythingLLM.
This would require the attacker also be able to guess these internal IPs as `/*` ranging is not possible, but could be brute forced.
There is a duty of care that other services on the same network would not be fully open and accessible via a simple CuRL with zero authentication as it is not possible to set headers or access via the link collector.
References
Configurations
No configuration.
History
21 Nov 2024, 08:47
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/mintplex-labs/anything-llm/commit/0db6c3b2aa1787a7054ffdaba975474f122c20eb - | |
References | () https://huntr.com/bounties/9a978edd-ac94-41fc-8e3e-c35441bdd12b - |
07 Mar 2024, 20:15
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.7 |
27 Feb 2024, 14:20
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-02-27 06:15
Updated : 2024-11-21 08:47
NVD link : CVE-2024-0759
Mitre link : CVE-2024-0759
CVE.ORG link : CVE-2024-0759
JSON object : View
Products Affected
No product.
CWE
CWE-918
Server-Side Request Forgery (SSRF)