Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-j7mj-9hgx-cgcf

Опубликовано: 16 апр. 2024
Источник: github
Github: Не прошло ревью
CVSS3: 9

Описание

In mintplex-labs/anything-llm, an attacker can exploit improper input validation by sending a malformed JSON payload to the '/system/enable-multi-user' endpoint. This triggers an error that is caught by a catch block, which in turn deletes all users and disables the 'multi_user_mode'. The vulnerability allows an attacker to remove all existing users and potentially create a new admin user without requiring a password, leading to unauthorized access and control over the application.

In mintplex-labs/anything-llm, an attacker can exploit improper input validation by sending a malformed JSON payload to the '/system/enable-multi-user' endpoint. This triggers an error that is caught by a catch block, which in turn deletes all users and disables the 'multi_user_mode'. The vulnerability allows an attacker to remove all existing users and potentially create a new admin user without requiring a password, leading to unauthorized access and control over the application.

EPSS

Процентиль: 43%
0.00206
Низкий

9 Critical

CVSS3

Дефекты

CWE-20

Связанные уязвимости

CVSS3: 8
nvd
почти 2 года назад

In mintplex-labs/anything-llm, an attacker can exploit improper input validation by sending a malformed JSON payload to the '/system/enable-multi-user' endpoint. This triggers an error that is caught by a catch block, which in turn deletes all users and disables the 'multi_user_mode'. The vulnerability allows an attacker to remove all existing users and potentially create a new admin user without requiring a password, leading to unauthorized access and control over the application.

EPSS

Процентиль: 43%
0.00206
Низкий

9 Critical

CVSS3

Дефекты

CWE-20