Agnai is an artificial-intelligence-agnostic multi-user, mult-bot roleplaying chat system. A vulnerability in versions prior to 1.0.330 permits attackers to read arbitrary JSON files at attacker-chosen locations on the server. This issue can lead to unauthorized access to sensitive information and exposure of confidential configuration files. This only affects installations with `JSON_STORAGE` enabled which is intended to local/self-hosting only. Version 1.0.330 fixes this issue.
References
Link | Resource |
---|---|
https://github.com/agnaistic/agnai/security/advisories/GHSA-h355-hm5h-cm8h | Vendor Advisory |
Configurations
History
29 Oct 2024, 20:59
Type | Values Removed | Values Added |
---|---|---|
First Time |
Agnai
Agnai agnai |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.3 |
CPE | cpe:2.3:a:agnai:agnai:*:*:*:*:*:*:*:* | |
CWE | CWE-22 | |
References | () https://github.com/agnaistic/agnai/security/advisories/GHSA-h355-hm5h-cm8h - Vendor Advisory |
26 Sep 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-09-26 18:15
Updated : 2024-10-29 20:59
NVD link : CVE-2024-47170
Mitre link : CVE-2024-47170
JSON object : View
Products Affected
agnai
- agnai
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')