Agnai is an artificial-intelligence-agnostic multi-user, mult-bot roleplaying chat system. A vulnerability in versions prior to 1.0.330 permits attackers to upload image files at attacker-chosen location on the server. This issue can lead to image file uploads to unauthorized or unintended directories, including overwriting of existing images which may be used for defacement. This does not affect `agnai.chat`, installations using S3-compatible storage, or self-hosting that is not publicly exposed. Version 1.0.330 fixes this vulnerability.
Metrics
Affected Vendors & Products
References
History
Wed, 30 Oct 2024 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Agnai
Agnai agnai |
|
Weaknesses | CWE-22 | |
CPEs | cpe:2.3:a:agnai:agnai:*:*:*:*:*:*:*:* | |
Vendors & Products |
Agnai
Agnai agnai |
Thu, 26 Sep 2024 18:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 26 Sep 2024 17:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Agnai is an artificial-intelligence-agnostic multi-user, mult-bot roleplaying chat system. A vulnerability in versions prior to 1.0.330 permits attackers to upload image files at attacker-chosen location on the server. This issue can lead to image file uploads to unauthorized or unintended directories, including overwriting of existing images which may be used for defacement. This does not affect `agnai.chat`, installations using S3-compatible storage, or self-hosting that is not publicly exposed. Version 1.0.330 fixes this vulnerability. | |
Title | Agnai vulnerable to Relative Path Traversal in Image Upload | |
Weaknesses | CWE-35 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-09-26T17:53:23.119Z
Reserved: 2024-09-19T22:32:11.961Z
Link: CVE-2024-47171

Updated: 2024-09-26T17:51:26.489Z

Status : Analyzed
Published: 2024-09-26T18:15:10.590
Modified: 2024-10-30T20:46:24.610
Link: CVE-2024-47171

No data.