A Local File Inclusion (LFI) vulnerability exists in the /load-workflow endpoint of modelscope/agentscope version v0.0.4. This vulnerability allows an attacker to read arbitrary files from the server, including sensitive files such as API keys, by manipulating the filename parameter. The issue arises due to improper sanitization of user input passed to the os.path.join function, which can be exploited to access files outside the intended directory.
History

Tue, 11 Feb 2025 00:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 10 Feb 2025 19:00:00 +0000

Type Values Removed Values Added
Description A Local File Inclusion (LFI) vulnerability exists in the /load-workflow endpoint of modelscope/agentscope version v0.0.4. This vulnerability allows an attacker to read arbitrary files from the server, including sensitive files such as API keys, by manipulating the filename parameter. The issue arises due to improper sanitization of user input passed to the os.path.join function, which can be exploited to access files outside the intended directory.
Title Local File Inclusion (LFI) in modelscope/agentscope
Weaknesses CWE-497
References
Metrics cvssV3_0

{'score': 7.5, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: @huntr_ai

Published:

Updated: 2025-02-10T23:20:32.284Z

Reserved: 2024-09-06T19:25:22.845Z

Link: CVE-2024-8550

cve-icon Vulnrichment

Updated: 2025-02-10T23:20:26.392Z

cve-icon NVD

Status : Received

Published: 2025-02-10T19:15:39.440

Modified: 2025-02-11T00:15:29.010

Link: CVE-2024-8550

cve-icon Redhat

No data.