Описание
MaxKB is an open-source AI assistant for enterprise. Prior to version 2.0.0, the sandbox design rules can be bypassed because MaxKB only restricts the execution permissions of files in a specific directory. Therefore, an attacker can use the shutil.copy2 method in Python to copy the command they want to execute to the executable directory. This bypasses directory restrictions and reverse shell. Version 2.0.0 fixes the issue.
Ссылки
- Release Notes
- ExploitVendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 2.0.0 (исключая)
cpe:2.3:a:maxkb:maxkb:*:*:*:*:lts:*:*:*
EPSS
Процентиль: 6%
0.00025
Низкий
4.6 Medium
CVSS3
6.3 Medium
CVSS3
Дефекты
CWE-94
EPSS
Процентиль: 6%
0.00025
Низкий
4.6 Medium
CVSS3
6.3 Medium
CVSS3
Дефекты
CWE-94