Should an instance of AnythingLLM be hosted on an internal network and the attacked be explicitly granted a permission level of manager or admin, they could link-scrape internally resolving IPs of other services that are on the same network as AnythingLLM.
This would require the attacker also be able to guess these internal IPs as `/*` ranging is not possible, but could be brute forced.
There is a duty of care that other services on the same network would not be fully open and accessible via a simple CuRL with zero authentication as it is not possible to set headers or access via the link collector.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: @huntr_ai
Published: 2024-02-27T05:12:38.318Z
Updated: 2024-08-11T14:28:00.394Z
Reserved: 2024-01-19T18:44:41.153Z
Link: CVE-2024-0759
Vulnrichment
Updated: 2024-08-01T18:18:18.647Z
NVD
Status : Awaiting Analysis
Published: 2024-02-27T06:15:45.493
Modified: 2024-03-07T20:15:50.480
Link: CVE-2024-0759
Redhat
No data.