CVE-2024-0765
- EPSS 0.11%
- Veröffentlicht 03.03.2024 15:15:07
- Zuletzt bearbeitet 08.01.2025 14:32:04
As a default user on a multi-user instance of AnythingLLM, you could execute a call to the `/export-data` endpoint of the system and then unzip and read that export that would enable you do exfiltrate data of the system at that save state. This woul...
CVE-2024-0795
- EPSS 0.41%
- Veröffentlicht 02.03.2024 22:15:49
- Zuletzt bearbeitet 21.01.2025 15:06:36
If an attacked was given access to an instance with the admin or manager role there is no backend authentication that would prevent the attacked from creating a new user with an `admin` role and then be able to use this new account to have elevated p...
CVE-2024-0550
- EPSS 1.15%
- Veröffentlicht 28.02.2024 05:15:08
- Zuletzt bearbeitet 10.01.2025 15:22:26
A user who is privileged already `manager` or `admin` can set their profile picture via the frontend API using a relative filepath to then user the PFP GET API to download any valid files. The attacker would have to have been granted privileged perm...
CVE-2024-0763
- EPSS 0.69%
- Veröffentlicht 27.02.2024 22:15:14
- Zuletzt bearbeitet 27.03.2025 11:15:36
Any user can delete an arbitrary folder (recursively) on a remote server due to bad input sanitization leading to path traversal. The attacker would need access to the server at some privilege level since this endpoint is protected and requires autho...
CVE-2024-0551
- EPSS 0.92%
- Veröffentlicht 27.02.2024 14:15:27
- Zuletzt bearbeitet 04.03.2025 12:24:19
Enable exports of the database and associated exported information of the system via the default user role. The attacked would have to have been granted access to the system prior to the attack. It is worth noting that the deterministic nature of th...
CVE-2024-0759
- EPSS 0.41%
- Veröffentlicht 27.02.2024 06:15:45
- Zuletzt bearbeitet 04.03.2025 12:24:19
Should an instance of AnythingLLM be hosted on an internal network and the attacked be explicitly granted a permission level of manager or admin, they could link-scrape internally resolving IPs of other services that are on the same network as Anythi...
CVE-2024-0798
- EPSS 0.17%
- Veröffentlicht 26.02.2024 16:27:51
- Zuletzt bearbeitet 27.02.2025 03:05:58
A privilege escalation vulnerability exists in mintplex-labs/anything-llm, allowing users with 'default' role to delete documents uploaded by 'admin'. Despite the intended restriction that prevents 'default' role users from deleting admin-uploaded do...
CVE-2024-0455
- EPSS 0.13%
- Veröffentlicht 26.02.2024 16:27:50
- Zuletzt bearbeitet 27.02.2025 03:05:58
The inclusion of the web scraper for AnythingLLM means that any user with the proper authorization level (manager, admin, and when in single user) could put in the URL ``` http://169.254.169.254/latest/meta-data/identity-credentials/ec2/security-cred...
CVE-2024-0440
- EPSS 0.2%
- Veröffentlicht 26.02.2024 16:27:50
- Zuletzt bearbeitet 27.02.2025 03:05:58
Attacker, with permission to submit a link or submits a link via POST to be collected that is using the file:// protocol can then introspect host files and other relatively stored files.
CVE-2024-0439
- EPSS 0.22%
- Veröffentlicht 26.02.2024 16:27:50
- Zuletzt bearbeitet 26.02.2025 15:14:42
As a manager, you should not be able to modify a series of settings. In the UI this is indeed hidden as a convenience for the role since most managers would not be savvy enough to modify these settings. They can use their token to still modify those ...