CVE-2024-6091

A vulnerability in significant-gravitas/autogpt version 0.5.1 allows an attacker to bypass the shell commands denylist settings. The issue arises when the denylist is configured to block specific commands, such as 'whoami' and '/bin/whoami'. An attacker can circumvent this restriction by executing commands with a modified path, such as '/bin/./whoami', which is not recognized by the denylist.
Configurations

Configuration 1 (hide)

cpe:2.3:a:agpt:autogpt:0.5.1:*:*:*:*:*:*:*

History

18 Sep 2024, 18:41

Type Values Removed Values Added
References () https://github.com/significant-gravitas/autogpt/commit/ef691359b774a1f9f80cf4f5ace9821967b718ed - () https://github.com/significant-gravitas/autogpt/commit/ef691359b774a1f9f80cf4f5ace9821967b718ed - Patch
References () https://huntr.com/bounties/8a742c13-bb5e-4bc9-8b86-049d8a386050 - () https://huntr.com/bounties/8a742c13-bb5e-4bc9-8b86-049d8a386050 - Exploit, Third Party Advisory
First Time Agpt
Agpt autogpt
Summary
  • (es) Una vulnerabilidad en la versión 0.5.1 de significant-gravitas/autogpt permite a un atacante eludir la configuración de la lista de denegación de comandos del shell. El problema surge cuando la lista de denegación está configurada para bloquear comandos específicos, como "whoami" y "/bin/whoami". Un atacante puede eludir esta restricción ejecutando comandos con una ruta modificada, como "/bin/./whoami", que no es reconocida por la lista de denegación.
CPE cpe:2.3:a:agpt:autogpt:0.5.1:*:*:*:*:*:*:*

11 Sep 2024, 13:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-09-11 13:15

Updated : 2024-09-18 18:41


NVD link : CVE-2024-6091

Mitre link : CVE-2024-6091

CVE.ORG link : CVE-2024-6091


JSON object : View

Products Affected

agpt

  • autogpt
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')