A Server-Side Request Forgery (SSRF) vulnerability exists in the file upload section of imartinez/privategpt version 0.5.0. This vulnerability allows attackers to send crafted requests that could result in unauthorized access to the local network and potentially sensitive information. Specifically, by manipulating the 'path' parameter in a file upload request, an attacker can cause the application to make arbitrary requests to internal services, including the AWS metadata endpoint. This issue could lead to the exposure of internal servers and sensitive data.
References
Link | Resource |
---|---|
https://huntr.com/bounties/5f421645-3546-4a67-a421-ee1bc4b6e3a3 | Exploit Third Party Advisory |
https://huntr.com/bounties/5f421645-3546-4a67-a421-ee1bc4b6e3a3 | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2024-06-06 19:16
Updated : 2024-11-21 09:47
NVD link : CVE-2024-5186
Mitre link : CVE-2024-5186
CVE.ORG link : CVE-2024-5186
JSON object : View
Products Affected
zylon
- privategpt
CWE
CWE-918
Server-Side Request Forgery (SSRF)