Vulnerability Description
In eosphoros-ai/db-gpt version v0.6.0, the web API `POST /api/v1/editor/sql/run` allows execution of arbitrary SQL queries without any access control. This vulnerability can be exploited by attackers to perform Arbitrary File Write using DuckDB SQL, enabling them to write arbitrary files to the victim's file system. This can potentially lead to Remote Code Execution (RCE).
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Dbgpt | Db-Gpt | 0.6.0 |
Related Weaknesses (CWE)
References
- https://huntr.com/bounties/e32fda74-ca83-431c-8de8-08274ba686c9ExploitThird Party Advisory
FAQ
What is CVE-2024-10835?
CVE-2024-10835 is a vulnerability with a CVSS score of 9.8 (CRITICAL). In eosphoros-ai/db-gpt version v0.6.0, the web API `POST /api/v1/editor/sql/run` allows execution of arbitrary SQL queries without any access control. This vulnerability can be exploited by attackers ...
How severe is CVE-2024-10835?
CVE-2024-10835 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2024-10835?
Check the references section above for vendor advisories and patch information. Affected products include: Dbgpt Db-Gpt.