Vulnerability Description
A path traversal vulnerability exists in modelscope/agentscope version v.0.0.4. The API endpoint `/api/file` does not properly sanitize the `path` parameter, allowing an attacker to read arbitrary files on the server.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Modelscope | Agentscope | 0.0.4 |
Related Weaknesses (CWE)
References
- https://huntr.com/bounties/3f170c58-42ee-422d-ab6f-32c7aa05b974ExploitThird Party Advisory
FAQ
What is CVE-2024-8438?
CVE-2024-8438 is a vulnerability with a CVSS score of 7.5 (HIGH). A path traversal vulnerability exists in modelscope/agentscope version v.0.0.4. The API endpoint `/api/file` does not properly sanitize the `path` parameter, allowing an attacker to read arbitrary fil...
How severe is CVE-2024-8438?
CVE-2024-8438 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-8438?
Check the references section above for vendor advisories and patch information. Affected products include: Modelscope Agentscope.