Vulnerability Description
An arbitrary file overwrite vulnerability exists in the ZulipConnector of danswer-ai/danswer, affecting the latest version. The vulnerability arises from the load_credentials method, where user-controlled input for realm_name and zuliprc_content is used to construct file paths and write file contents. This allows attackers to overwrite or create arbitrary files if a zuliprc- directory already exists in the temporary directory.
CVSS Score
CRITICAL
Related Weaknesses (CWE)
References
FAQ
What is CVE-2024-7957?
CVE-2024-7957 is a vulnerability with a CVSS score of 9.1 (CRITICAL). An arbitrary file overwrite vulnerability exists in the ZulipConnector of danswer-ai/danswer, affecting the latest version. The vulnerability arises from the load_credentials method, where user-contro...
How severe is CVE-2024-7957?
CVE-2024-7957 has been rated CRITICAL with a CVSS base score of 9.1/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2024-7957?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.