प्लेटफ़ॉर्म
nodejs
घटक
mintplex-labs/anything-llm
में ठीक किया गया
1.0.1
CVE-2024-0440 is a critical Server-Side Request Forgery (SSRF) vulnerability affecting versions of the anything-llm Node.js library up to and including 1.0.0. This vulnerability allows an attacker, possessing the ability to submit links (potentially via a POST request), to leverage the file:// protocol to introspect host files and other relatively stored files. A fix is available in version 1.0.0.
The SSRF vulnerability in anything-llm poses a significant risk because it allows attackers to read sensitive files from the server's file system. This could include configuration files containing database credentials, API keys, or other secrets. An attacker could potentially gain access to internal resources and data that should not be publicly accessible. The impact is amplified if the application is running with elevated privileges, as the attacker could then access files owned by the application's user. Successful exploitation could lead to complete compromise of the server and the data it holds.
CVE-2024-0440 was publicly disclosed on 2024-02-25. No known public proof-of-concept (PoC) exploits have been released at the time of this writing, but the SSRF nature of the vulnerability makes it likely that PoCs will emerge. The vulnerability is not currently listed on the CISA KEV catalog. Given the CRITICAL CVSS score and the ease of exploitation (requiring only the ability to submit a URL), active exploitation is possible.
Applications utilizing the anything-llm Node.js library in versions prior to 1.0.0 are at risk. This includes applications that process user-supplied URLs without proper validation, particularly those deployed in environments where file system access is not strictly controlled. Shared hosting environments where the application has access to the host's file system are particularly vulnerable.
• nodejs / server:
npm list anything-llm | grep -q '1.0.0' || echo "Vulnerable version detected!" • generic web:
curl -I 'http://your-server/your-endpoint?url=file:///etc/passwd' | grep 'HTTP/1.1 403' # Check for access denieddisclosure
एक्सप्लॉइट स्थिति
EPSS
0.19% (41% शतमक)
CVSS वेक्टर
The primary mitigation for CVE-2024-0440 is to upgrade to version 1.0.0 of the anything-llm library. If upgrading is not immediately feasible, implement strict input validation on any URLs submitted by users. Specifically, filter out or sanitize any requests that include the file:// protocol. Consider using a Web Application Firewall (WAF) to block requests containing suspicious URLs. Additionally, restrict the application's access to the file system to only the necessary directories, minimizing the potential impact of a successful SSRF attack. After upgrade, confirm by attempting a POST request with a file:// URL and verifying that it is rejected.
Actualice la aplicación Anything LLM a la versión 1.0.0 o posterior. Esta versión contiene una corrección para la vulnerabilidad SSRF que impide el acceso no autorizado a archivos del sistema. La actualización se puede realizar a través del gestor de paquetes npm o siguiendo las instrucciones de actualización proporcionadas por el proveedor.
भेद्यता विश्लेषण और गंभीर अलर्ट सीधे आपके ईमेल में।
CVE-2024-0440 is a critical SSRF vulnerability in the anything-llm Node.js library, allowing attackers to access host files via the file:// protocol in POST requests.
You are affected if you are using anything-llm versions less than or equal to 1.0.0 and are not validating user-supplied URLs.
Upgrade to version 1.0.0 of anything-llm. If immediate upgrade isn't possible, implement strict input validation to filter out file:// URLs.
While no public exploits are currently known, the CRITICAL severity and ease of exploitation suggest active exploitation is possible.
Refer to the project's repository or website for the official advisory, typically found in the release notes or security announcements.
अपनी डिपेंडेंसी फ़ाइल अपलोड करें और तुरंत जानें कि यह CVE और अन्य आपको प्रभावित करती हैं या नहीं।