A Path Traversal vulnerability exists in the eosphoros-ai/db-gpt version 0.6.0 at the API endpoint `/v1/resource/file/delete`. This vulnerability allows an attacker to delete any file on the server by manipulating the `file_key` parameter. The `file_key` parameter is not properly sanitized, enabling an attacker to specify arbitrary file paths. If the specified file exists, the application will delete it.
References
| Link | Resource |
|---|---|
| https://huntr.com/bounties/26adf08a-9262-4d5a-a2ee-ce12ed919620 | Exploit Third Party Advisory |
| https://huntr.com/bounties/26adf08a-9262-4d5a-a2ee-ce12ed919620 | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2025-03-20 10:15
Updated : 2025-07-17 13:37
NVD link : CVE-2024-10830
Mitre link : CVE-2024-10830
CVE.ORG link : CVE-2024-10830
JSON object : View
Products Affected
dbgpt
- db-gpt
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
