CVE-2024-10835
Published: 20 March 2025
Description
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Security Summary
CVE-2024-10835 is a critical vulnerability in eosphoros-ai/db-gpt version v0.6.0, where the web API endpoint POST /api/v1/editor/sql/run allows execution of arbitrary SQL queries without any access control. This flaw, classified under CWE-89 (SQL Injection), enables attackers to exploit DuckDB SQL functionality for arbitrary file writes to the victim's file system, potentially escalating to remote code execution (RCE). The issue carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), highlighting its severe impact.
Unauthenticated remote attackers can exploit this vulnerability by sending crafted requests to the affected API endpoint, requiring no privileges, low attack complexity, or user interaction. Successful exploitation grants the ability to write arbitrary files anywhere on the file system via DuckDB's SQL capabilities, which can overwrite critical files or configurations, leading to full system compromise through RCE.
Mitigation details and additional technical information are available in the advisory published on Huntr at https://huntr.com/bounties/e32fda74-ca83-431c-8de8-08274ba686c9. The vulnerability was publicly disclosed on 2025-03-20.
Details
- CWE(s)
Affected Products
AI Security Analysis
- AI Category
- Enterprise AI Assistants
- Risk Domain
- Other ATLAS/OWASP Terms
- OWASP Top 10 for LLMs 2025
- None mapped
- MITRE ATLAS Techniques
- None mapped
- Classification Reason
- DB-GPT (eosphoros-ai/db-gpt) is an open-source AI-native data app builder integrating LLMs with databases for natural language interactions, fitting Enterprise AI Assistants category. Vulnerability in web API for SQL execution aligns with AI platform deployment.
MITRE ATT&CK Enterprise Techniques
Why these techniques?
The vulnerability in the public-facing web API allows unauthenticated arbitrary SQL query execution via POST /api/v1/editor/sql/run, enabling arbitrary file writes with DuckDB and potential RCE, directly mapping to exploitation of a public-facing application.