Auto-GPT is an experimental open-source application showcasing the capabilities of the GPT-4 language model. Running Auto-GPT version prior to 0.4.3 by cloning the git repo and executing `docker compose run auto-gpt` in the repo root uses a different docker-compose.yml file from the one suggested in the official docker set up instructions. The docker-compose.yml file located in the repo root mounts itself into the docker container without write protection. This means that if malicious custom python code is executed via the `execute_python_file` and `execute_python_code` commands, it can overwrite the docker-compose.yml file and abuse it to gain control of the host system the next time Auto-GPT is started. The issue has been patched in version 0.4.3.
History

Wed, 30 Oct 2024 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2023-07-13T22:33:16.889Z

Updated: 2024-10-30T18:46:55.656Z

Reserved: 2023-06-29T19:35:26.440Z

Link: CVE-2023-37273

cve-icon Vulnrichment

Updated: 2024-08-02T17:09:34.123Z

cve-icon NVD

Status : Modified

Published: 2023-07-13T23:15:10.747

Modified: 2024-11-21T08:11:22.180

Link: CVE-2023-37273

cve-icon Redhat

No data.