Critical

anything-llm

Anonymous Access to Import Endpoint Leads to Database Deletion/Spoofing

An improper access control vulnerability in the latest version of the software allows an anonymous attacker to import their own database file, leading to the deletion or spoofing of the `anythingllm.db` file. This issue was patched in version 1.0.0.

Available publicly on Mar 01 2024

9.1

CVSS:

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H

Credit:

dastaj
Threat Overview

The vulnerability arises from improper access control on the data import endpoint, allowing unauthorized users to upload their own database files. This can result in the deletion of the existing anythingllm.db file and its replacement with a malicious database. Consequently, attackers can serve malicious data to users or collect sensitive information.

Attack Scenario

An attacker without an account in the application sends a specially crafted HTTP POST request to the /api/system/data-import endpoint, uploading a malicious database file. Upon rebuilding the container, the attacker's database file replaces the original anythingllm.db, altering the application's data and potentially serving malicious content to users.

Who is affected

Users of the latest version of the software prior to version 1.0.0 are affected. This includes any deployment where the data import endpoint is exposed and not properly secured.

Technical Report
Want more out of Sightline?

Sightline offers even more for premium customers

Go Premium

We have 436 related security advisories that are available with Sightline Premium.