Should an instance of AnythingLLM be hosted on an internal network and the attacked be explicitly granted a permission level of manager or admin, they could link-scrape internally resolving IPs of other services that are on the same network as AnythingLLM.
This would require the attacker also be able to guess these internal IPs as `/*` ranging is not possible, but could be brute forced.
There is a duty of care that other services on the same network would not be fully open and accessible via a simple CuRL with zero authentication as it is not possible to set headers or access via the link collector.
References
Configurations
History
04 Mar 2025, 12:24
Type | Values Removed | Values Added |
---|---|---|
CWE | ||
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
First Time |
Mintplexlabs anythingllm
Mintplexlabs |
|
CPE | cpe:2.3:a:mintplexlabs:anythingllm:*:*:*:*:*:*:*:* | |
References | () https://huntr.com/bounties/9a978edd-ac94-41fc-8e3e-c35441bdd12b - Exploit | |
References | () https://github.com/mintplex-labs/anything-llm/commit/0db6c3b2aa1787a7054ffdaba975474f122c20eb - Patch |
27 Feb 2024, 06:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-02-27 06:15
Updated : 2025-03-04 12:24
NVD link : CVE-2024-0759
Mitre link : CVE-2024-0759
JSON object : View
Products Affected
mintplexlabs
- anythingllm
CWE
No CWE.