Cyber Posture

CVE-2024-10902

CriticalPublic PoC

Published: 20 March 2025

Published
20 March 2025
Modified
15 October 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0180 82.9th percentile
Risk Priority 21 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may abuse Python commands and scripts for execution.

Security Summary

CVE-2024-10902, published on 2025-03-20, is an Arbitrary File Upload vulnerability with Path Traversal in eosphoros-ai/db-gpt version v0.6.0. The affected component is the web API endpoint `POST /v1/personal/agent/upload`, which fails to properly validate file paths, enabling attackers to write arbitrary files to any location on the victim's file system.

The vulnerability has a CVSS score of 9.8 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and is associated with CWE-22. Unauthorized remote attackers can exploit it with low complexity, no privileges, and no user interaction required. Exploitation allows uploading malicious files anywhere, potentially leading to remote code execution (RCE), such as by writing a malicious `__init__.py` file to Python's `/site-packages/` directory.

Mitigation details are available in the Huntr advisory at https://huntr.com/bounties/f7fbf76e-aa1c-4106-b007-e9579f4f7d5f.

Details

CWE(s)
CWE-22

Affected Products

dbgpt
db-gpt
0.6.0

AI Security Analysis

AI Category
Other Platforms
Risk Domain
N/A
OWASP Top 10 for LLMs 2025
None mapped
MITRE ATLAS Techniques
None mapped
Classification Reason
Regex match

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.006 Python Execution
Adversaries may abuse Python commands and scripts for execution.
Why these techniques?

The CVE describes an arbitrary file upload vulnerability with path traversal in a public-facing web API, directly enabling exploitation of public-facing applications (T1190) and allowing upload of malicious Python code (e.g., __init__.py to site-packages) for RCE via the Python interpreter (T1059.006).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References