{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T12:17:27.157","vulnerabilities":[{"cve":{"id":"CVE-2024-10831","sourceIdentifier":"security@huntr.dev","published":"2025-03-20T10:15:20.500","lastModified":"2025-07-17T13:38:08.167","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"In eosphoros-ai/db-gpt version 0.6.0, the endpoint for uploading files is vulnerable to absolute path traversal. This vulnerability allows an attacker to upload arbitrary files to arbitrary locations on the target server. The issue arises because the `file_key` and `doc_file.filename` parameters are user-controllable, enabling the construction of paths outside the intended directory. This can lead to overwriting essential system files, such as SSH keys, for further exploitation."},{"lang":"es","value":"En la versión 0.6.0 de eosphoros-ai/db-gpt, el endpoint para subir archivos es vulnerable a path traversal absoluto. Esta vulnerabilidad permite a un atacante subir archivos arbitrarios a ubicaciones arbitrarias en el servidor objetivo. El problema surge porque los parámetros `file_key` y `doc_file.filename` son controlables por el usuario, lo que permite la construcción de rutas fuera del directorio de destino. Esto puede provocar la sobrescritura de archivos esenciales del sistema, como claves SSH, para su posterior explotación."}],"metrics":{"cvssMetricV30":[{"source":"security@huntr.dev","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H","baseScore":9.1,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.2}]},"weaknesses":[{"source":"security@huntr.dev","type":"Secondary","description":[{"lang":"en","value":"CWE-36"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:dbgpt:db-gpt:0.6.0:*:*:*:*:*:*:*","matchCriteriaId":"EBDB9D41-53F0-4893-AD12-C627705D4615"}]}]}],"references":[{"url":"https://huntr.com/bounties/5c34c39f-66d4-414c-ab6a-f7888a5d882a","source":"security@huntr.dev","tags":["Exploit","Third Party Advisory"]}]}}]}