As a default user on a multi-user instance of AnythingLLM, you could execute a call to the `/export-data` endpoint of the system and then unzip and read that export that would enable you do exfiltrate data of the system at that save state. This would require the attacked to be granted explicit access to the system, but they can do this at any role. Additionally, post-download, the data is deleted so no evidence would exist that the exfiltration occured.
History

Wed, 08 Jan 2025 15:00:00 +0000

Type Values Removed Values Added
First Time appeared Mintplexlabs
Mintplexlabs anythingllm
CPEs cpe:2.3:a:mintplexlabs:anythingllm:*:*:*:*:*:*:*:*
Vendors & Products Mintplexlabs
Mintplexlabs anythingllm
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: @huntr_ai

Published:

Updated: 2024-08-16T19:20:10.865Z

Reserved: 2024-01-19T21:02:39.732Z

Link: CVE-2024-0765

cve-icon Vulnrichment

Updated: 2024-08-01T18:18:18.998Z

cve-icon NVD

Status : Analyzed

Published: 2024-03-03T15:15:07.113

Modified: 2025-01-08T14:32:04.447

Link: CVE-2024-0765

cve-icon Redhat

No data.