eosphoros-ai/DB-GPT version latest is vulnerable to arbitrary file deletion on Windows systems via the '/v1/agent/hub/update' endpoint. The application fails to properly filter the '\' character, which is commonly used as a separator in Windows paths. This vulnerability allows attackers to delete any files on the host system by manipulating the 'plugin_repo_name' variable.
References
Link | Resource |
---|---|
https://huntr.com/bounties/7e854343-3d61-47d4-ad41-c4d2f356a54a | Exploit Third Party Advisory |
Configurations
History
17 Jul 2025, 15:56
Type | Values Removed | Values Added |
---|---|---|
First Time |
Dbgpt db-gpt
Dbgpt |
|
CPE | cpe:2.3:a:dbgpt:db-gpt:0.6.1:*:*:*:*:*:*:* | |
Summary |
|
|
References | () https://huntr.com/bounties/7e854343-3d61-47d4-ad41-c4d2f356a54a - Exploit, Third Party Advisory |
20 Mar 2025, 10:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-03-20 10:15
Updated : 2025-07-17 15:56
NVD link : CVE-2025-0452
Mitre link : CVE-2025-0452
CVE.ORG link : CVE-2025-0452
JSON object : View
Products Affected
dbgpt
- db-gpt
CWE
CWE-73
External Control of File Name or Path