CVE-2024-3104

A remote code execution vulnerability exists in mintplex-labs/anything-llm due to improper handling of environment variables. Attackers can exploit this vulnerability by injecting arbitrary environment variables via the `POST /api/system/update-env` endpoint, which allows for the execution of arbitrary code on the host running anything-llm. The vulnerability is present in the latest version of anything-llm, with the latest commit identified as fde905aac1812b84066ff72e5f2f90b56d4c3a59. This issue has been fixed in version 1.0.0. Successful exploitation could lead to code execution on the host, enabling attackers to read and modify data accessible to the user running the service, potentially leading to a denial of service.
Configurations

Configuration 1 (hide)

cpe:2.3:a:mintplexlabs:anythingllm:*:*:*:*:*:*:*:*

History

15 Oct 2024, 20:21

Type Values Removed Values Added
First Time Mintplexlabs
Mintplexlabs anythingllm
CPE cpe:2.3:a:mintplexlabs:anythingllm:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : 9.6
v2 : unknown
v3 : 9.8
References () https://github.com/mintplex-labs/anything-llm/commit/bfedfebfab032e6f4d5a369c8a2f947c5d0c5286 - () https://github.com/mintplex-labs/anything-llm/commit/bfedfebfab032e6f4d5a369c8a2f947c5d0c5286 - Patch
References () https://huntr.com/bounties/4f2fcb45-5828-4bec-985a-9d3a0ee00462 - () https://huntr.com/bounties/4f2fcb45-5828-4bec-985a-9d3a0ee00462 - Exploit, Third Party Advisory

07 Jun 2024, 14:56

Type Values Removed Values Added
Summary
  • (es) Existe una vulnerabilidad de ejecución remota de código en mintplex-labs/anything-llm debido al manejo inadecuado de las variables de entorno. Los atacantes pueden explotar esta vulnerabilidad inyectando variables de entorno arbitrarias a través del endpoint `POST /api/system/update-env`, que permite la ejecución de código arbitrario en el host que ejecuta cualquier cosa-llm. La vulnerabilidad está presente en la última versión de everything-llm, con el ultimo commit identificada como fde905aac1812b84066ff72e5f2f90b56d4c3a59. Este problema se solucionó en la versión 1.0.0. Una explotación exitosa podría conducir a la ejecución de código en el host, lo que permitiría a los atacantes leer y modificar datos accesibles para el usuario que ejecuta el servicio, lo que podría conducir a una denegación de servicio.

06 Jun 2024, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-06 18:15

Updated : 2024-10-15 20:21


NVD link : CVE-2024-3104

Mitre link : CVE-2024-3104

CVE.ORG link : CVE-2024-3104


JSON object : View

Products Affected

mintplexlabs

  • anythingllm
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')