As a default user on a multi-user instance of AnythingLLM, you could execute a call to the `/export-data` endpoint of the system and then unzip and read that export that would enable you do exfiltrate data of the system at that save state.
This would require the attacked to be granted explicit access to the system, but they can do this at any role. Additionally, post-download, the data is deleted so no evidence would exist that the exfiltration occured.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: @huntr_ai
Published: 2024-03-03T14:13:41.067Z
Updated: 2024-08-16T19:20:10.865Z
Reserved: 2024-01-19T21:02:39.732Z
Link: CVE-2024-0765
Vulnrichment
Updated: 2024-08-01T18:18:18.998Z
NVD
Status : Awaiting Analysis
Published: 2024-03-03T15:15:07.113
Modified: 2024-11-21T08:47:19.380
Link: CVE-2024-0765
Redhat
No data.