Show filters
114 Total Results
Displaying 51-60 of 114
Sort by:
Attacker Value
Unknown
CVE-2024-0439
Disclosure Date: February 26, 2024 (last updated February 27, 2024)
As a manager, you should not be able to modify a series of settings. In the UI this is indeed hidden as a convenience for the role since most managers would not be savvy enough to modify these settings. They can use their token to still modify those settings though through a standard HTTP request
While this is not a critical vulnerability, it does indeed need to be patched to enforce the expected permission level.
0
Attacker Value
Unknown
CVE-2024-0436
Disclosure Date: February 26, 2024 (last updated February 27, 2024)
Theoretically, it would be possible for an attacker to brute-force the password for an instance in single-user password protection mode via a timing attack given the linear nature of the `!==` used for comparison.
The risk is minified by the additional overhead of the request, which varies in a non-constant nature making the attack less reliable to execute
0
Attacker Value
Unknown
CVE-2024-0435
Disclosure Date: February 26, 2024 (last updated February 27, 2024)
User can send a chat that contains an XSS opportunity that will then run when the chat is sent and on subsequent page loads.
Given the minimum requirement for a user to send a chat is to be given access to a workspace via an admin the risk is low. Additionally, the location in which the XSS renders is only limited to the user who submits the XSS.
Ultimately, this attack is limited to the user attacking themselves. There is no anonymous chat submission unless the user does not take the minimum steps required to protect their instance.
0
Attacker Value
Unknown
CVE-2024-0879
Disclosure Date: January 25, 2024 (last updated February 01, 2024)
Authentication bypass in vector-admin allows a user to register to a vector-admin server while “domain restriction” is active, even when not owning an authorized email address.
0
Attacker Value
Unknown
CVE-2024-22422
Disclosure Date: January 19, 2024 (last updated January 26, 2024)
AnythingLLM is an application that turns any document, resource, or piece of content into context that any LLM can use as references during chatting. In versions prior to commit `08d33cfd8` an unauthenticated API route (file export) can allow attacker to crash the server resulting in a denial of service attack. The “data-export” endpoint is used to export files using the filename parameter as user input. The endpoint takes the user input, filters it to avoid directory traversal attacks, fetches the file from the server, and afterwards deletes it. An attacker can trick the input filter mechanism to point to the current directory, and while attempting to delete it the server will crash as there is no error-handling wrapper around it. Moreover, the endpoint is public and does not require any form of authentication, resulting in an unauthenticated Denial of Service issue, which crashes the instance using a single HTTP packet. This issue has been addressed in commit `08d33cfd8`. Users are …
0
Attacker Value
Unknown
CVE-2023-5833
Disclosure Date: October 30, 2023 (last updated November 09, 2023)
Improper Access Control in GitHub repository mintplex-labs/anything-llm prior to 0.1.0.
0
Attacker Value
Unknown
CVE-2023-5832
Disclosure Date: October 30, 2023 (last updated November 09, 2023)
Improper Input Validation in GitHub repository mintplex-labs/anything-llm prior to 0.1.0.
0
Attacker Value
Unknown
CVE-2022-4245
Disclosure Date: September 25, 2023 (last updated October 12, 2024)
A flaw was found in codehaus-plexus. The org.codehaus.plexus.util.xml.XmlWriterUtil#writeComment fails to sanitize comments for a --> sequence. This issue means that text contained in the command string could be interpreted as XML and allow for XML injection.
0
Attacker Value
Unknown
CVE-2022-4244
Disclosure Date: September 25, 2023 (last updated October 12, 2024)
A flaw was found in codeplex-codehaus. A directory traversal attack (also known as path traversal) aims to access files and directories stored outside the intended folder. By manipulating files with "dot-dot-slash (../)" sequences and their variations or by using absolute file paths, it may be possible to access arbitrary files and directories stored on the file system, including application source code, configuration, and other critical system files.
0
Attacker Value
Unknown
CVE-2023-4899
Disclosure Date: September 12, 2023 (last updated October 08, 2023)
SQL Injection in GitHub repository mintplex-labs/anything-llm prior to 0.0.1.
0