CVE-2024-6091

A vulnerability in significant-gravitas/autogpt version 0.5.1 allows an attacker to bypass the shell commands denylist settings. The issue arises when the denylist is configured to block specific commands, such as 'whoami' and '/bin/whoami'. An attacker can circumvent this restriction by executing commands with a modified path, such as '/bin/./whoami', which is not recognized by the denylist.
Configurations

Configuration 1 (hide)

cpe:2.3:a:agpt:autogpt:0.5.1:*:*:*:*:*:*:*

History

18 Sep 2024, 18:41

Type Values Removed Values Added
CPE cpe:2.3:a:agpt:autogpt:0.5.1:*:*:*:*:*:*:*
References () https://github.com/significant-gravitas/autogpt/commit/ef691359b774a1f9f80cf4f5ace9821967b718ed - () https://github.com/significant-gravitas/autogpt/commit/ef691359b774a1f9f80cf4f5ace9821967b718ed - Patch
References () https://huntr.com/bounties/8a742c13-bb5e-4bc9-8b86-049d8a386050 - () https://huntr.com/bounties/8a742c13-bb5e-4bc9-8b86-049d8a386050 - Exploit, Third Party Advisory
First Time Agpt autogpt
Agpt

11 Sep 2024, 16:26

Type Values Removed Values Added
New CVE

Information

Published : 2024-09-11 13:15

Updated : 2024-09-18 18:41


NVD link : CVE-2024-6091

Mitre link : CVE-2024-6091

CVE.ORG link : CVE-2024-6091


JSON object : View

Products Affected

agpt

  • autogpt
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')