CVE-2024-9617
Published: 20 March 2025
Description
Adversaries may leverage chat and messaging applications, such as Microsoft Teams, Google Chat, and Slack, to mine valuable information.
Security Summary
CVE-2024-9617 is an Insecure Direct Object Reference (IDOR) vulnerability, classified under CWE-639, affecting danswer-ai/danswer version 0.3.94. The flaw occurs because the application fails to verify whether a requesting user is the creator of a file before serving its contents. Specifically, attackers can directly invoke the GET /api/chat/file/{file_id} endpoint with any file identifier to access files belonging to other users.
Any authenticated user within the danswer-ai/danswer environment can exploit this vulnerability by supplying an arbitrary file_id in the API request, bypassing access controls. Successful exploitation grants unauthorized read access to sensitive files uploaded by other users, potentially exposing confidential data depending on what was stored.
The primary advisory is documented on Huntr at https://huntr.com/bounties/8f683ff6-3a99-41c6-b763-a8f7b73bd146, which details the issue reported via their bug bounty program. No specific patch or mitigation steps are outlined in the provided CVE information.
Details
- CWE(s)
AI Security Analysis
- AI Category
- Enterprise AI Assistants
- Risk Domain
- Privacy and Disclosure
- OWASP Top 10 for LLMs 2025
- None mapped
- MITRE ATLAS Techniques
- None mapped
- Classification Reason
- Danswer (danswer-ai/danswer) is an open-source enterprise AI search and chat assistant platform, fitting the Enterprise AI Assistants category.
MITRE ATT&CK Enterprise Techniques
Why these techniques?
The IDOR vulnerability enables unauthorized access to any user's files via the chat API without ownership verification, facilitating file and directory discovery (T1083) and data collection from messaging/chat applications (T1213.005).