Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-9617: CWE-639 Authorization Bypass Through User-Controlled Key in danswer-ai danswer-ai/danswer

0
Medium
VulnerabilityCVE-2024-9617cvecve-2024-9617cwe-639
Published: Thu Mar 20 2025 (03/20/2025, 10:10:25 UTC)
Source: CVE Database V5
Vendor/Project: danswer-ai
Product: danswer-ai/danswer

Description

An IDOR vulnerability in danswer-ai/danswer v0.3.94 allows an attacker to view any files. The application does not verify whether the attacker is the creator of the file, allowing the attacker to directly call the GET /api/chat/file/{file_id} interface to view any user's file.

AI-Powered Analysis

AILast updated: 10/15/2025, 13:05:34 UTC

Technical Analysis

CVE-2024-9617 identifies an authorization bypass vulnerability classified under CWE-639 (Authorization Bypass Through User-Controlled Key) in the danswer-ai/danswer application, specifically version 0.3.94. The vulnerability is an IDOR flaw where the application exposes the GET /api/chat/file/{file_id} API endpoint without properly verifying that the requesting user is authorized to access the requested file. This means an attacker with at least limited privileges (PR:L in CVSS) can manipulate the file_id parameter to retrieve files owned by other users. The vulnerability does not require user interaction (UI:N) and can be exploited remotely over the network (AV:N) with low attack complexity (AC:L). The impact is primarily on confidentiality (C:H), as unauthorized file disclosure can lead to leakage of sensitive or proprietary information. However, the vulnerability does not affect integrity or availability of the system. No patches or known exploits have been reported yet, but the flaw represents a significant risk in environments where sensitive data is stored or shared via danswer-ai/danswer. The vulnerability was published on 2025-03-20 and assigned a CVSS v3.0 score of 6.5, reflecting a medium severity rating. The root cause is insufficient authorization checks on user-controlled keys (file_id), a common security oversight in API design.

Potential Impact

For European organizations, the primary impact of CVE-2024-9617 is unauthorized disclosure of sensitive files stored or shared within the danswer-ai/danswer platform. This can lead to breaches of confidentiality, exposing intellectual property, personal data, or business-critical information. Organizations in regulated sectors such as finance, healthcare, and government could face compliance violations under GDPR and other data protection laws if sensitive personal or confidential data is leaked. The vulnerability could also undermine trust in AI collaboration tools and lead to reputational damage. Since the flaw does not affect integrity or availability, operational disruption is unlikely, but the data exposure risk alone warrants urgent attention. The ease of exploitation and lack of required user interaction increase the threat level, especially in multi-tenant or collaborative environments common in European enterprises. Attackers with limited privileges, such as low-level employees or compromised accounts, could leverage this vulnerability to escalate data access beyond their authorization.

Mitigation Recommendations

European organizations using danswer-ai/danswer should immediately audit their deployment for this vulnerability and implement the following specific mitigations: 1) Enforce strict authorization checks on all file access endpoints, ensuring that the requesting user is the owner or has explicit permission to access the file identified by file_id. 2) Implement robust access control mechanisms such as role-based access control (RBAC) or attribute-based access control (ABAC) to limit file visibility. 3) Monitor and log all file access requests, especially those involving unusual file_id patterns or access attempts from unexpected users. 4) Conduct a thorough code review and penetration testing focused on IDOR and authorization bypass issues in the API. 5) If possible, isolate sensitive files or data in separate storage with additional access restrictions. 6) Educate developers and security teams on secure API design principles to prevent similar flaws. 7) Stay alert for official patches or updates from danswer-ai and apply them promptly once available. 8) Consider implementing Web Application Firewalls (WAF) with custom rules to detect and block suspicious file_id manipulation attempts until a patch is deployed.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
@huntr_ai
Date Reserved
2024-10-07T23:02:51.278Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 68ef9b30178f764e1f470f02

Added to database: 10/15/2025, 1:01:36 PM

Last enriched: 10/15/2025, 1:05:34 PM

Last updated: 10/16/2025, 2:08:34 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats