A Server-Side Request Forgery (SSRF) vulnerability exists in the file upload section of imartinez/privategpt version 0.5.0. This vulnerability allows attackers to send crafted requests that could result in unauthorized access to the local network and potentially sensitive information. Specifically, by manipulating the 'path' parameter in a file upload request, an attacker can cause the application to make arbitrary requests to internal services, including the AWS metadata endpoint. This issue could lead to the exposure of internal servers and sensitive data.
Metrics
Affected Vendors & Products
References
History
Tue, 24 Sep 2024 14:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Zylon
Zylon privategpt |
|
CPEs | cpe:2.3:a:zylon:privategpt:0.5.0:*:*:*:*:*:*:* | |
Vendors & Products |
Zylon
Zylon privategpt |
|
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: @huntr_ai
Published: 2024-06-06T18:19:57.023Z
Updated: 2024-08-01T21:03:11.037Z
Reserved: 2024-05-21T20:10:37.932Z
Link: CVE-2024-5186
Vulnrichment
Updated: 2024-08-01T21:03:11.037Z
NVD
Status : Analyzed
Published: 2024-06-06T19:16:05.860
Modified: 2024-09-24T14:04:47.170
Link: CVE-2024-5186
Redhat
No data.