Medium

anything-llm

Improper Storage of Sensitive Information in Bearer Token

The latest version of the mintplex-labs/anything-llm project contains a vulnerability where a password is improperly stored within a JWT used as a bearer token. This issue was patched in version 1.0.3.

Available publicly on Oct 02 2024

5.9

CVSS:

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

Credit:

karthik983
Threat Overview

The vulnerability involves storing sensitive information, specifically a password, in plaintext within a JWT. This improper storage allows an attacker who gains access to the JWT to easily decode it and retrieve the password. This can lead to unauthorized access and sensitive information disclosure, compromising the confidentiality and integrity of user data.

Attack Scenario

An attacker intercepts an HTTP request or response containing a JWT using a tool like Burp Suite. The attacker then decodes the JWT to reveal the plaintext password, which can be used to gain unauthorized access to the application.

Who is affected

Users of the mintplex-labs/anything-llm project running the latest version before 1.0.3 are affected. This includes any deployment where JWTs are used for authentication in single user mode.

Technical Report
Want more out of Sightline?

Sightline offers even more for premium customers

Go Premium

We have 568 related security advisories that are available with Sightline Premium.