Plattform
python
Komponente
transformeroptimus/superagi
CVE-2024-9415 describes a Path Traversal vulnerability discovered in the file upload functionality of transformeroptimus/superagi versions 0.0.14 and earlier. This flaw allows attackers to bypass intended access controls and upload arbitrary files to the server. Successful exploitation could lead to remote code execution or the overwriting of critical system files, compromising the integrity and confidentiality of the SuperAGI deployment. The vulnerability was publicly disclosed on 2025-03-20.
The primary impact of CVE-2024-9415 is the ability for an attacker to upload arbitrary files to the SuperAGI server. This is a significant risk because the attacker can potentially upload malicious code (e.g., a web shell) that grants them remote code execution. Beyond RCE, an attacker could overwrite configuration files, database files, or other sensitive data, leading to data breaches, denial of service, or complete system compromise. The blast radius extends to any data processed or stored by SuperAGI, and the potential for lateral movement within the network depends on the server's access privileges and network configuration. This vulnerability shares similarities with other path traversal exploits where attackers leverage predictable file system structures to gain unauthorized access.
CVE-2024-9415 was publicly disclosed on 2025-03-20. The EPSS score is currently pending evaluation. There are no known public proof-of-concept exploits available at this time, but the vulnerability's nature makes it likely that one will emerge. Monitor security advisories and threat intelligence feeds for updates on exploitation activity.
Organizations deploying SuperAGI, particularly those using the 0.0.14 version or earlier, are at risk. Shared hosting environments where SuperAGI is deployed alongside other applications are particularly vulnerable, as a successful exploit could potentially compromise other tenants on the same server. Users who have not implemented robust file upload validation and access controls are also at increased risk.
• python / server:
import os
import glob
# Check for unusual files in the upload directory
upload_dir = '/path/to/superagi/uploads/'
for file in glob.glob(upload_dir + '*'):
if '..' in file or '../' in file:
print(f'Potential Path Traversal: {file}')• linux / server:
# Check for files outside the intended upload directory
find /path/to/superagi/uploads/ -type f -not -path '/path/to/superagi/uploads/*'• generic web:
curl -I 'http://your-superagi-server/uploads/../../../../etc/passwd' # Check for directory traversal attemptsdisclosure
Exploit-Status
EPSS
1.35% (80% Perzentil)
CISA SSVC
CVSS-Vektor
The most effective mitigation for CVE-2024-9415 is to upgrade to a patched version of SuperAGI as soon as it becomes available. Until a patch is available, implement strict file upload validation on the server-side. This includes whitelisting allowed file extensions, validating file sizes, and sanitizing filenames to prevent directory traversal characters (e.g., '..'). Restrict the writable directories accessible to the SuperAGI application to only those necessary for its operation. Consider implementing a Web Application Firewall (WAF) with rules to detect and block path traversal attempts. Regularly review file system permissions to ensure that SuperAGI has only the minimum necessary access.
Actualice SuperAGI a una versión posterior a 0.0.14 que corrija la vulnerabilidad de Path Traversal. Consulte las notas de la versión o el registro de cambios para obtener detalles sobre la corrección. Como medida preventiva, revise y valide las rutas de los archivos cargados por los usuarios para evitar el acceso a directorios no autorizados.
Schwachstellenanalysen und kritische Warnungen direkt in deinen Posteingang.
CVE-2024-9415 is a Path Traversal vulnerability in SuperAGI versions up to the latest, allowing attackers to upload arbitrary files potentially leading to code execution.
If you are running SuperAGI version 0.0.14 or earlier, you are affected by this vulnerability and should prioritize patching.
Upgrade to a patched version of SuperAGI as soon as it becomes available. In the meantime, implement mitigation steps like restricting upload paths and validating file types.
Currently, there are no confirmed reports of active exploitation, but the vulnerability is publicly known and could be targeted.
Refer to the transformeroptimus/superagi project repository and associated security advisories for updates and official guidance.
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.
Lade deine requirements.txt-Datei hoch und wir sagen dir sofort, ob du betroffen bist.