Agnai is an artificial-intelligence-agnostic multi-user, mult-bot roleplaying chat system. A vulnerability in versions prior to 1.0.330 permits attackers to read arbitrary JSON files at attacker-chosen locations on the server. This issue can lead to unauthorized access to sensitive information and exposure of confidential configuration files. This only affects installations with `JSON_STORAGE` enabled which is intended to local/self-hosting only. Version 1.0.330 fixes this issue.
References
Link | Resource |
---|---|
https://github.com/agnaistic/agnai/security/advisories/GHSA-h355-hm5h-cm8h | Vendor Advisory |
Configurations
History
29 Oct 2024, 20:59
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/agnaistic/agnai/security/advisories/GHSA-h355-hm5h-cm8h - Vendor Advisory | |
CWE | CWE-22 | |
CPE | cpe:2.3:a:agnai:agnai:*:*:*:*:*:*:*:* | |
First Time |
Agnai
Agnai agnai |
30 Sep 2024, 12:46
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
26 Sep 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-09-26 18:15
Updated : 2024-10-29 20:59
NVD link : CVE-2024-47170
Mitre link : CVE-2024-47170
CVE.ORG link : CVE-2024-47170
JSON object : View
Products Affected
agnai
- agnai