CVE-2024-10902
Published: 20 March 2025
Description
Adversaries may abuse Python commands and scripts for execution.
Security Summary
CVE-2024-10902, published on 2025-03-20, is an Arbitrary File Upload vulnerability with Path Traversal in eosphoros-ai/db-gpt version v0.6.0. The affected component is the web API endpoint `POST /v1/personal/agent/upload`, which fails to properly validate file paths, enabling attackers to write arbitrary files to any location on the victim's file system.
The vulnerability has a CVSS score of 9.8 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and is associated with CWE-22. Unauthorized remote attackers can exploit it with low complexity, no privileges, and no user interaction required. Exploitation allows uploading malicious files anywhere, potentially leading to remote code execution (RCE), such as by writing a malicious `__init__.py` file to Python's `/site-packages/` directory.
Mitigation details are available in the Huntr advisory at https://huntr.com/bounties/f7fbf76e-aa1c-4106-b007-e9579f4f7d5f.
Details
- CWE(s)
Affected Products
AI Security Analysis
- AI Category
- Other Platforms
- Risk Domain
- N/A
- OWASP Top 10 for LLMs 2025
- None mapped
- MITRE ATLAS Techniques
- None mapped
- Classification Reason
- Regex match
MITRE ATT&CK Enterprise Techniques
Why these techniques?
The CVE describes an arbitrary file upload vulnerability with path traversal in a public-facing web API, directly enabling exploitation of public-facing applications (T1190) and allowing upload of malicious Python code (e.g., __init__.py to site-packages) for RCE via the Python interpreter (T1059.006).