A vulnerability in significant-gravitas/autogpt version 0.5.1 allows an attacker to bypass the shell commands denylist settings. The issue arises when the denylist is configured to block specific commands, such as 'whoami' and '/bin/whoami'. An attacker can circumvent this restriction by executing commands with a modified path, such as '/bin/./whoami', which is not recognized by the denylist.
Metrics
Affected Vendors & Products
References
History
Wed, 18 Sep 2024 19:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Agpt
Agpt autogpt |
|
CPEs | cpe:2.3:a:agpt:autogpt:0.5.1:*:*:*:*:*:*:* | |
Vendors & Products |
Agpt
Agpt autogpt |
|
Metrics |
cvssV3_1
|
Wed, 11 Sep 2024 19:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Significant-gravitas
Significant-gravitas autogpt |
|
CPEs | cpe:2.3:a:significant-gravitas:autogpt:*:*:*:*:*:*:*:* | |
Vendors & Products |
Significant-gravitas
Significant-gravitas autogpt |
|
Metrics |
ssvc
|
Wed, 11 Sep 2024 13:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability in significant-gravitas/autogpt version 0.5.1 allows an attacker to bypass the shell commands denylist settings. The issue arises when the denylist is configured to block specific commands, such as 'whoami' and '/bin/whoami'. An attacker can circumvent this restriction by executing commands with a modified path, such as '/bin/./whoami', which is not recognized by the denylist. | |
Title | Shell Command Denylist Bypass in significant-gravitas/autogpt | |
Weaknesses | CWE-78 | |
References |
| |
Metrics |
cvssV3_0
|

Status: PUBLISHED
Assigner: @huntr_ai
Published:
Updated: 2024-09-11T18:23:23.728Z
Reserved: 2024-06-17T18:16:47.500Z
Link: CVE-2024-6091

Updated: 2024-09-11T18:23:19.677Z

Status : Analyzed
Published: 2024-09-11T13:15:03.440
Modified: 2024-09-18T18:41:31.247
Link: CVE-2024-6091

No data.