Description
An arbitrary file download vulnerability exists in the rpc_agent_client component of modelscope/agentscope version v0.0.4. This vulnerability allows any user to download any file from the rpc_agent's host by exploiting the download_file method. This can lead to unauthorized access to sensitive information, including configuration files, credentials, and potentially system files, which may facilitate further exploitation such as privilege escalation or lateral movement within the network.
Published: 2025-03-20
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-6894 An arbitrary file download vulnerability exists in the rpc_agent_client component of modelscope/agentscope version v0.0.4. This vulnerability allows any user to download any file from the rpc_agent's host by exploiting the download_file method. This can lead to unauthorized access to sensitive information, including configuration files, credentials, and potentially system files, which may facilitate further exploitation such as privilege escalation or lateral movement within the network.
Github GHSA Github GHSA GHSA-p6h7-hfj2-vmcf AgentScope arbitrary file download vulnerability in rpc_agent_client
History

Tue, 01 Apr 2025 21:00:00 +0000

Type Values Removed Values Added
First Time appeared Modelscope
Modelscope agentscope
CPEs cpe:2.3:a:modelscope:agentscope:0.0.4:*:*:*:*:*:*:*
Vendors & Products Modelscope
Modelscope agentscope
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Thu, 20 Mar 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 20 Mar 2025 10:15:00 +0000

Type Values Removed Values Added
Description An arbitrary file download vulnerability exists in the rpc_agent_client component of modelscope/agentscope version v0.0.4. This vulnerability allows any user to download any file from the rpc_agent's host by exploiting the download_file method. This can lead to unauthorized access to sensitive information, including configuration files, credentials, and potentially system files, which may facilitate further exploitation such as privilege escalation or lateral movement within the network.
Title Arbitrary File Download in modelscope/agentscope
Weaknesses CWE-36
References
Metrics cvssV3_0

{'score': 7.5, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

Modelscope Agentscope
cve-icon MITRE

Status: PUBLISHED

Assigner: @huntr_ai

Published:

Updated: 2025-03-20T14:46:18.305Z

Reserved: 2024-09-05T20:15:43.015Z

Link: CVE-2024-8501

cve-icon Vulnrichment

Updated: 2025-03-20T14:46:07.844Z

cve-icon NVD

Status : Analyzed

Published: 2025-03-20T10:15:42.610

Modified: 2025-04-01T20:31:58.713

Link: CVE-2024-8501

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses