CVE-2024-8551 describes a path traversal vulnerability affecting modelscope/agentscope versions up to the latest release. This flaw allows attackers to bypass intended file system restrictions, potentially gaining unauthorized access to sensitive data. The vulnerability resides within the save-workflow and load-workflow functionalities, and a fix is available. Prompt patching is recommended to prevent exploitation.
The path traversal vulnerability in modelscope/agentscope allows an attacker to manipulate file paths, effectively bypassing security controls. This means an attacker can read and write arbitrary JSON files on the server's file system. The potential impact is significant: attackers could expose configuration files containing API keys, database credentials, or other sensitive information. They could also modify these files to inject malicious code or alter the application's behavior. The ability to write arbitrary files could lead to remote code execution if the application processes the modified JSON files without proper validation. This vulnerability presents a high risk of data breach and system compromise.
CVE-2024-8551 was published on 2025-03-20. The vulnerability's severity is rated as CRITICAL (CVSS 9.1). As of this writing, there are no publicly known proof-of-concept exploits. It is not currently listed on the CISA KEV catalog. The ease of exploitation is likely moderate, given the path traversal nature of the vulnerability, but requires access to the save-workflow or load-workflow functionality.
Organizations deploying modelscope/agentscope, particularly those using it in production environments or handling sensitive data, are at risk. This includes developers integrating agentscope into their applications and those relying on agentscope for workflow automation. Shared hosting environments where multiple users share the same file system are particularly vulnerable.
• python / server:
import os
import json
# Check for suspicious file paths in save_workflow and load_workflow functions
# Look for paths containing '..' or absolute paths outside of expected directories
# Example: Check if a file path contains '..'
file_path = '/path/to/file/../sensitive_file.json'
if '..' in file_path:
print(f"Suspicious file path detected: {file_path}")• generic web:
# Check access logs for requests containing suspicious file paths
grep '..' /var/log/apache2/access.logdisclosure
漏洞利用状态
EPSS
0.24% (47% 百分位)
CISA SSVC
CVSS 向量
The primary mitigation for CVE-2024-8551 is to upgrade to a patched version of modelscope/agentscope. Consult the project's repository or release notes for the latest version containing the fix. If upgrading immediately is not feasible, consider implementing temporary workarounds such as restricting file system access for the agentscope process to only necessary directories. Implement strict input validation on any user-supplied file paths used in the save-workflow and load-workflow functions. Monitor file system activity for unexpected file creations or modifications, particularly in sensitive directories.
将 modelscope/agentscope 库更新到最新可用版本。 这将修复路径遍历漏洞。 请务必查看版本说明,了解任何其他更新说明。
漏洞分析和关键警报直接发送到您的邮箱。
CVE-2024-8551 is a critical path traversal vulnerability in modelscope/agentscope allowing attackers to read/write arbitrary JSON files, potentially exposing sensitive data.
Yes, if you are using modelscope/agentscope versions prior to the fix, you are vulnerable to this path traversal attack.
Upgrade to the latest version of modelscope/agentscope, which includes a patch for this vulnerability. Consult the project's repository for release details.
As of now, there are no publicly known active exploitation campaigns targeting CVE-2024-8551, but the vulnerability's severity warrants immediate attention.
Refer to the modelscope/agentscope project's repository or release notes for the official advisory and details on the fix.
上传你的 requirements.txt 文件,立即知道是否受影响。