Cyber Posture

CVE-2024-9617

N/A

Published: 20 March 2025

Published
20 March 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score N/A
EPSS Score 0.1556 94.7th percentile
Risk Priority 9 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may leverage chat and messaging applications, such as Microsoft Teams, Google Chat, and Slack, to mine valuable information.

Security Summary

CVE-2024-9617 is an Insecure Direct Object Reference (IDOR) vulnerability, classified under CWE-639, affecting danswer-ai/danswer version 0.3.94. The flaw occurs because the application fails to verify whether a requesting user is the creator of a file before serving its contents. Specifically, attackers can directly invoke the GET /api/chat/file/{file_id} endpoint with any file identifier to access files belonging to other users.

Any authenticated user within the danswer-ai/danswer environment can exploit this vulnerability by supplying an arbitrary file_id in the API request, bypassing access controls. Successful exploitation grants unauthorized read access to sensitive files uploaded by other users, potentially exposing confidential data depending on what was stored.

The primary advisory is documented on Huntr at https://huntr.com/bounties/8f683ff6-3a99-41c6-b763-a8f7b73bd146, which details the issue reported via their bug bounty program. No specific patch or mitigation steps are outlined in the provided CVE information.

Details

CWE(s)
CWE-639

AI Security Analysis

AI Category
Enterprise AI Assistants
Risk Domain
Privacy and Disclosure
OWASP Top 10 for LLMs 2025
None mapped
MITRE ATLAS Techniques
None mapped
Classification Reason
Danswer (danswer-ai/danswer) is an open-source enterprise AI search and chat assistant platform, fitting the Enterprise AI Assistants category.

MITRE ATT&CK Enterprise Techniques

T1083 File and Directory Discovery Discovery
Adversaries may enumerate files and directories or may search in specific locations of a host or network share for certain information within a file system.
T1213.005 Messaging Applications Collection
Adversaries may leverage chat and messaging applications, such as Microsoft Teams, Google Chat, and Slack, to mine valuable information.
Why these techniques?

The IDOR vulnerability enables unauthorized access to any user's files via the chat API without ownership verification, facilitating file and directory discovery (T1083) and data collection from messaging/chat applications (T1213.005).

References