CVE-2024-3403 (GCVE-0-2024-3403)
Vulnerability from cvelistv5 – Published: 2024-05-16 09:03 – Updated: 2024-08-01 20:12
VLAI?
Title
Local File Inclusion in imartinez/privategpt
Summary
imartinez/privategpt version 0.2.0 is vulnerable to a local file inclusion vulnerability that allows attackers to read arbitrary files from the filesystem. By manipulating file upload functionality to ingest arbitrary local files, attackers can exploit the 'Search in Docs' feature or query the AI to retrieve or disclose the contents of any file on the system. This vulnerability could lead to various impacts, including but not limited to remote code execution by obtaining private SSH keys, unauthorized access to private files, source code disclosure facilitating further attacks, and exposure of configuration files.
Severity ?
7.5 (High)
CWE
- CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| imartinez | imartinez/privategpt |
Affected:
unspecified , ≤ latest
(custom)
|
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:a:zylon-ai:private-gpt:0.2.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "private-gpt",
"vendor": "zylon-ai",
"versions": [
{
"status": "affected",
"version": "0.2.0"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-3403",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-06-03T15:54:29.147724Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-06-04T17:32:52.510Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-01T20:12:06.834Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://huntr.com/bounties/7431d1dd-f014-4d4f-acb6-f97369ef3688"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "imartinez/privategpt",
"vendor": "imartinez",
"versions": [
{
"lessThanOrEqual": "latest",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "imartinez/privategpt version 0.2.0 is vulnerable to a local file inclusion vulnerability that allows attackers to read arbitrary files from the filesystem. By manipulating file upload functionality to ingest arbitrary local files, attackers can exploit the \u0027Search in Docs\u0027 feature or query the AI to retrieve or disclose the contents of any file on the system. This vulnerability could lead to various impacts, including but not limited to remote code execution by obtaining private SSH keys, unauthorized access to private files, source code disclosure facilitating further attacks, and exposure of configuration files."
}
],
"metrics": [
{
"cvssV3_0": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-22",
"description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-05-16T09:03:47.440Z",
"orgId": "c09c270a-b464-47c1-9133-acb35b22c19a",
"shortName": "@huntr_ai"
},
"references": [
{
"url": "https://huntr.com/bounties/7431d1dd-f014-4d4f-acb6-f97369ef3688"
}
],
"source": {
"advisory": "7431d1dd-f014-4d4f-acb6-f97369ef3688",
"discovery": "EXTERNAL"
},
"title": "Local File Inclusion in imartinez/privategpt"
}
},
"cveMetadata": {
"assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a",
"assignerShortName": "@huntr_ai",
"cveId": "CVE-2024-3403",
"datePublished": "2024-05-16T09:03:47.440Z",
"dateReserved": "2024-04-05T18:08:10.775Z",
"dateUpdated": "2024-08-01T20:12:06.834Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"descriptions": "[{\"lang\": \"en\", \"value\": \"imartinez/privategpt version 0.2.0 is vulnerable to a local file inclusion vulnerability that allows attackers to read arbitrary files from the filesystem. By manipulating file upload functionality to ingest arbitrary local files, attackers can exploit the \u0027Search in Docs\u0027 feature or query the AI to retrieve or disclose the contents of any file on the system. This vulnerability could lead to various impacts, including but not limited to remote code execution by obtaining private SSH keys, unauthorized access to private files, source code disclosure facilitating further attacks, and exposure of configuration files.\"}, {\"lang\": \"es\", \"value\": \"imartinez/privategpt versi\\u00f3n 0.2.0 es vulnerable a una vulnerabilidad de inclusi\\u00f3n de archivos local que permite a los atacantes leer archivos arbitrarios del sistema de archivos. Al manipular la funcionalidad de carga de archivos para ingerir archivos locales arbitrarios, los atacantes pueden explotar la funci\\u00f3n \\\"Buscar en Documentos\\\" o consultar la IA para recuperar o revelar el contenido de cualquier archivo en el sistema. Esta vulnerabilidad podr\\u00eda provocar varios impactos, que incluyen, entre otros, la ejecuci\\u00f3n remota de c\\u00f3digo mediante la obtenci\\u00f3n de claves SSH privadas, el acceso no autorizado a archivos privados, la divulgaci\\u00f3n del c\\u00f3digo fuente que facilita m\\u00e1s ataques y la exposici\\u00f3n de archivos de configuraci\\u00f3n.\"}]",
"id": "CVE-2024-3403",
"lastModified": "2024-11-21T09:29:31.520",
"metrics": "{\"cvssMetricV30\": [{\"source\": \"security@huntr.dev\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\", \"baseScore\": 7.5, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 3.6}]}",
"published": "2024-05-16T09:15:14.053",
"references": "[{\"url\": \"https://huntr.com/bounties/7431d1dd-f014-4d4f-acb6-f97369ef3688\", \"source\": \"security@huntr.dev\"}, {\"url\": \"https://huntr.com/bounties/7431d1dd-f014-4d4f-acb6-f97369ef3688\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "security@huntr.dev",
"vulnStatus": "Awaiting Analysis",
"weaknesses": "[{\"source\": \"security@huntr.dev\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-22\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2024-3403\",\"sourceIdentifier\":\"security@huntr.dev\",\"published\":\"2024-05-16T09:15:14.053\",\"lastModified\":\"2025-07-17T20:01:01.267\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"imartinez/privategpt version 0.2.0 is vulnerable to a local file inclusion vulnerability that allows attackers to read arbitrary files from the filesystem. By manipulating file upload functionality to ingest arbitrary local files, attackers can exploit the \u0027Search in Docs\u0027 feature or query the AI to retrieve or disclose the contents of any file on the system. This vulnerability could lead to various impacts, including but not limited to remote code execution by obtaining private SSH keys, unauthorized access to private files, source code disclosure facilitating further attacks, and exposure of configuration files.\"},{\"lang\":\"es\",\"value\":\"imartinez/privategpt versi\u00f3n 0.2.0 es vulnerable a una vulnerabilidad de inclusi\u00f3n de archivos local que permite a los atacantes leer archivos arbitrarios del sistema de archivos. Al manipular la funcionalidad de carga de archivos para ingerir archivos locales arbitrarios, los atacantes pueden explotar la funci\u00f3n \\\"Buscar en Documentos\\\" o consultar la IA para recuperar o revelar el contenido de cualquier archivo en el sistema. Esta vulnerabilidad podr\u00eda provocar varios impactos, que incluyen, entre otros, la ejecuci\u00f3n remota de c\u00f3digo mediante la obtenci\u00f3n de claves SSH privadas, el acceso no autorizado a archivos privados, la divulgaci\u00f3n del c\u00f3digo fuente que facilita m\u00e1s ataques y la exposici\u00f3n de archivos de configuraci\u00f3n.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"security@huntr.dev\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"security@huntr.dev\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-22\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pribai:privategpt:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"0.2.0\",\"versionEndExcluding\":\"0.6.0\",\"matchCriteriaId\":\"756399A3-580C-46E8-BF71-7697CD3D231C\"}]}]}],\"references\":[{\"url\":\"https://huntr.com/bounties/7431d1dd-f014-4d4f-acb6-f97369ef3688\",\"source\":\"security@huntr.dev\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://huntr.com/bounties/7431d1dd-f014-4d4f-acb6-f97369ef3688\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://huntr.com/bounties/7431d1dd-f014-4d4f-acb6-f97369ef3688\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-01T20:12:06.834Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-3403\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"poc\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-06-03T15:54:29.147724Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:zylon-ai:private-gpt:0.2.0:*:*:*:*:*:*:*\"], \"vendor\": \"zylon-ai\", \"product\": \"private-gpt\", \"versions\": [{\"status\": \"affected\", \"version\": \"0.2.0\"}], \"defaultStatus\": \"unknown\"}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-06-03T16:02:03.878Z\"}}], \"cna\": {\"title\": \"Local File Inclusion in imartinez/privategpt\", \"source\": {\"advisory\": \"7431d1dd-f014-4d4f-acb6-f97369ef3688\", \"discovery\": \"EXTERNAL\"}, \"metrics\": [{\"cvssV3_0\": {\"scope\": \"UNCHANGED\", \"version\": \"3.0\", \"baseScore\": 7.5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}}], \"affected\": [{\"vendor\": \"imartinez\", \"product\": \"imartinez/privategpt\", \"versions\": [{\"status\": \"affected\", \"version\": \"unspecified\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"latest\"}]}], \"references\": [{\"url\": \"https://huntr.com/bounties/7431d1dd-f014-4d4f-acb6-f97369ef3688\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"imartinez/privategpt version 0.2.0 is vulnerable to a local file inclusion vulnerability that allows attackers to read arbitrary files from the filesystem. By manipulating file upload functionality to ingest arbitrary local files, attackers can exploit the \u0027Search in Docs\u0027 feature or query the AI to retrieve or disclose the contents of any file on the system. This vulnerability could lead to various impacts, including but not limited to remote code execution by obtaining private SSH keys, unauthorized access to private files, source code disclosure facilitating further attacks, and exposure of configuration files.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-22\", \"description\": \"CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)\"}]}], \"providerMetadata\": {\"orgId\": \"c09c270a-b464-47c1-9133-acb35b22c19a\", \"shortName\": \"@huntr_ai\", \"dateUpdated\": \"2024-05-16T09:03:47.440Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2024-3403\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-08-01T20:12:06.834Z\", \"dateReserved\": \"2024-04-05T18:08:10.775Z\", \"assignerOrgId\": \"c09c270a-b464-47c1-9133-acb35b22c19a\", \"datePublished\": \"2024-05-16T09:03:47.440Z\", \"assignerShortName\": \"@huntr_ai\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…