Should an instance of AnythingLLM be hosted on an internal network and the attacked be explicitly granted a permission level of manager or admin, they could link-scrape internally resolving IPs of other services that are on the same network as AnythingLLM. This would require the attacker also be able to guess these internal IPs as `/*` ranging is not possible, but could be brute forced. There is a duty of care that other services on the same network would not be fully open and accessible via a simple CuRL with zero authentication as it is not possible to set headers or access via the link collector.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: @huntr_ai

Published: 2024-02-27T05:12:38.318Z

Updated: 2024-08-11T14:28:00.394Z

Reserved: 2024-01-19T18:44:41.153Z

Link: CVE-2024-0759

cve-icon Vulnrichment

Updated: 2024-08-01T18:18:18.647Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-02-27T06:15:45.493

Modified: 2024-03-07T20:15:50.480

Link: CVE-2024-0759

cve-icon Redhat

No data.