Anonymous Access to Import Endpoint Leads to Database Deletion/Spoofing
An improper access control vulnerability in the latest version of the software allows an anonymous attacker to import their own database file, leading to the deletion or spoofing of the `anythingllm.db` file. This issue was patched in version 1.0.0.
Available publicly on Mar 01 2024
Threat Overview
The vulnerability arises from improper access control on the data import endpoint, allowing unauthorized users to upload their own database files. This can result in the deletion of the existing anythingllm.db
file and its replacement with a malicious database. Consequently, attackers can serve malicious data to users or collect sensitive information.
Attack Scenario
An attacker without an account in the application sends a specially crafted HTTP POST request to the /api/system/data-import
endpoint, uploading a malicious database file. Upon rebuilding the container, the attacker's database file replaces the original anythingllm.db
, altering the application's data and potentially serving malicious content to users.
Who is affected
Users of the latest version of the software prior to version 1.0.0 are affected. This includes any deployment where the data import endpoint is exposed and not properly secured.
Technical Report
Want more out of Sightline?
Sightline offers even more for premium customers
Go Premium
We have - related security advisories that are available with Sightline Premium.