The attacker would have to have been granted privileged permissions to the system before executing this attack.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-16343 | A user who is privileged already `manager` or `admin` can set their profile picture via the frontend API using a relative filepath to then user the PFP GET API to download any valid files. The attacker would have to have been granted privileged permissions to the system before executing this attack. |
Fri, 10 Jan 2025 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Mintplexlabs
Mintplexlabs anythingllm |
|
| CPEs | cpe:2.3:a:mintplexlabs:anythingllm:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Mintplexlabs
Mintplexlabs anythingllm |
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: @huntr_ai
Published:
Updated: 2024-08-22T19:40:03.830Z
Reserved: 2024-01-15T00:56:12.183Z
Link: CVE-2024-0550
Updated: 2024-08-01T18:11:35.606Z
Status : Analyzed
Published: 2024-02-28T05:15:08.770
Modified: 2025-01-10T15:22:26.327
Link: CVE-2024-0550
No data.
OpenCVE Enrichment
No data.
EUVD