Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-f378-qx8v-c7cf

Опубликовано: 10 окт. 2024
Источник: github
Github: Не прошло ревью
CVSS3: 6.3

Описание

In version v0.3.8 of open-webui, an improper privilege management vulnerability exists in the API endpoints GET /api/v1/documents/ and POST /rag/api/v1/doc. This vulnerability allows a lower-privileged user to access and overwrite files managed by a higher-privileged admin. By exploiting this vulnerability, an attacker can view metadata of files uploaded by an admin and overwrite these files, compromising the integrity and availability of the RAG models.

In version v0.3.8 of open-webui, an improper privilege management vulnerability exists in the API endpoints GET /api/v1/documents/ and POST /rag/api/v1/doc. This vulnerability allows a lower-privileged user to access and overwrite files managed by a higher-privileged admin. By exploiting this vulnerability, an attacker can view metadata of files uploaded by an admin and overwrite these files, compromising the integrity and availability of the RAG models.

EPSS

Процентиль: 31%
0.00118
Низкий

6.3 Medium

CVSS3

Дефекты

CWE-269
CWE-863

Связанные уязвимости

CVSS3: 5.4
nvd
больше 1 года назад

In version v0.3.8 of open-webui, an improper privilege management vulnerability exists in the API endpoints GET /api/v1/documents/ and POST /rag/api/v1/doc. This vulnerability allows a lower-privileged user to access and overwrite files managed by a higher-privileged admin. By exploiting this vulnerability, an attacker can view metadata of files uploaded by an admin and overwrite these files, compromising the integrity and availability of the RAG models.

EPSS

Процентиль: 31%
0.00118
Низкий

6.3 Medium

CVSS3

Дефекты

CWE-269
CWE-863