Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-10902: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in eosphoros-ai eosphoros-ai/db-gpt

0
Critical
VulnerabilityCVE-2024-10902cvecve-2024-10902cwe-22
Published: Thu Mar 20 2025 (03/20/2025, 10:09:18 UTC)
Source: CVE Database V5
Vendor/Project: eosphoros-ai
Product: eosphoros-ai/db-gpt

Description

In eosphoros-ai/db-gpt version v0.6.0, the web API `POST /v1/personal/agent/upload` is vulnerable to Arbitrary File Upload with Path Traversal. This vulnerability allows unauthorized attackers to upload arbitrary files to the victim's file system at any location. The impact of this vulnerability includes the potential for remote code execution (RCE) by writing malicious files, such as a malicious `__init__.py` in the Python's `/site-packages/` directory.

AI-Powered Analysis

AILast updated: 10/15/2025, 13:19:00 UTC

Technical Analysis

CVE-2024-10902 is a critical security vulnerability identified in the eosphoros-ai/db-gpt software, specifically affecting version 0.6.0. The vulnerability arises from improper limitation of a pathname to a restricted directory (CWE-22), enabling a path traversal attack through the web API endpoint POST /v1/personal/agent/upload. This flaw allows an unauthenticated attacker to upload arbitrary files to any location on the server's file system, bypassing intended directory restrictions. The attacker can exploit this to write malicious files such as a crafted __init__.py script into Python's /site-packages/ directory, potentially achieving remote code execution (RCE). The vulnerability has a CVSS 3.0 base score of 9.1, reflecting its critical severity with network attack vector, no privileges required, no user interaction, and high impact on integrity and availability. The lack of authentication and user interaction requirements makes exploitation straightforward once the vulnerable API is accessible. Although no public exploits have been reported yet, the vulnerability's nature and impact make it a high-risk threat. The vulnerability stems from insufficient input validation and failure to properly sanitize or restrict file upload paths, allowing directory traversal sequences (e.g., ../) to escape designated upload directories. This can lead to full system compromise if exploited, especially on systems running Python environments where malicious code can be injected into core package directories. The vulnerability affects unspecified versions but is confirmed in v0.6.0, and no official patch links are currently provided, indicating the need for immediate mitigation by users and administrators.

Potential Impact

For European organizations, the impact of CVE-2024-10902 is severe. Exploitation can lead to unauthorized remote code execution, allowing attackers to gain full control over affected systems. This compromises the confidentiality, integrity, and availability of critical data and services. Organizations relying on eosphoros-ai/db-gpt for AI-driven applications or data processing may face operational disruptions, data breaches, and potential lateral movement within their networks. The ability to write arbitrary files anywhere on the file system increases the risk of persistent backdoors and malware implantation. Given the critical nature of the vulnerability and the lack of authentication requirements, attackers can exploit exposed API endpoints remotely over the network without user interaction. This elevates the threat level for cloud-hosted or internet-facing deployments common in European enterprises. The potential for supply chain attacks also exists if attackers compromise development or deployment environments. Overall, the vulnerability poses a significant risk to AI infrastructure security, regulatory compliance (e.g., GDPR), and business continuity in Europe.

Mitigation Recommendations

European organizations using eosphoros-ai/db-gpt should immediately implement the following mitigations: 1) Restrict and validate file upload paths rigorously on the server side to prevent directory traversal sequences. 2) Employ allowlists for permitted file types and enforce strict filename sanitization. 3) Isolate the application environment using containerization or sandboxing to limit file system access. 4) Monitor file system changes, especially in critical directories like Python's site-packages, using file integrity monitoring tools. 5) Disable or restrict the vulnerable upload API endpoint if not essential or place it behind strong authentication and network access controls. 6) Apply network-level protections such as Web Application Firewalls (WAFs) configured to detect and block path traversal attempts. 7) Stay updated with vendor advisories and apply patches promptly once available. 8) Conduct regular security assessments and penetration testing focusing on file upload functionalities. 9) Implement robust logging and alerting for suspicious upload activities. 10) Educate development and operations teams about secure coding practices to prevent similar vulnerabilities in future releases.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
@huntr_ai
Date Reserved
2024-11-05T19:59:44.116Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 68ef9b23178f764e1f470a60

Added to database: 10/15/2025, 1:01:23 PM

Last enriched: 10/15/2025, 1:19:00 PM

Last updated: 12/4/2025, 8:13:48 PM

Views: 19

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats