In eosphoros-ai/db-gpt version v0.6.0, the web API `POST /api/v1/editor/chart/run` allows execution of arbitrary SQL queries without any access control. This vulnerability can be exploited by attackers to perform Arbitrary File Write, enabling them to write arbitrary files to the victim's file system. This can potentially lead to Remote Code Execution (RCE) by writing malicious files such as `__init__.py` in the Python's `/site-packages/` directory.
References
Link | Resource |
---|---|
https://huntr.com/bounties/db2c1d59-6e3a-4553-a1f6-94c8df162a18 | Exploit Third Party Advisory |
Configurations
History
17 Jul 2025, 13:40
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:dbgpt:db-gpt:0.6.0:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
First Time |
Dbgpt db-gpt
Dbgpt |
|
References | () https://huntr.com/bounties/db2c1d59-6e3a-4553-a1f6-94c8df162a18 - Exploit, Third Party Advisory | |
Summary |
|
20 Mar 2025, 10:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-03-20 10:15
Updated : 2025-07-17 13:40
NVD link : CVE-2024-10901
Mitre link : CVE-2024-10901
CVE.ORG link : CVE-2024-10901
JSON object : View
Products Affected
dbgpt
- db-gpt
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type