
We found results for “”
CVE-2024-10835
Good to know:

Date: March 20, 2025
In eosphoros-ai/db-gpt version v0.6.0, the web API "POST /api/v1/editor/sql/run" allows execution of arbitrary SQL queries without any access control. This vulnerability can be exploited by attackers to perform Arbitrary File Write using DuckDB SQL, enabling them to write arbitrary files to the victim's file system. This can potentially lead to Remote Code Execution (RCE).
Severity Score
Related Resources (6)
Severity Score
Weakness Type (CWE)
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CWE-89Top Fix

Upgrade Version
Upgrade to version dbgpt - 0.7.0;dbgpt - 0.7.1;https://github.com/eosphoros-ai/DB-GPT.git - v0.7.0
CVSS v3.1
Base Score: |
|
---|---|
Attack Vector (AV): | NETWORK |
Attack Complexity (AC): | LOW |
Privileges Required (PR): | NONE |
User Interaction (UI): | NONE |
Scope (S): | UNCHANGED |
Confidentiality (C): | NONE |
Integrity (I): | HIGH |
Availability (A): | HIGH |