← Zuruck zu CVEs
CVE-2024-8156
CRITICAL9.8
Beschreibung
A command injection vulnerability exists in the workflow-checker.yml workflow of significant-gravitas/autogpt. The untrusted user input `github.head.ref` is used insecurely, allowing an attacker to inject arbitrary commands. This vulnerability affects versions up to and including the latest version. An attacker can exploit this by creating a branch name with a malicious payload and opening a pull request, potentially leading to reverse shell access or theft of sensitive tokens and keys.
CVE Details
CVSS v3.1 Bewertung9.8
SchweregradCRITICAL
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienNONE
BenutzerinteraktionNONE
Veroffentlicht3/20/2025
Zuletzt geandert10/15/2025
Quellenvd
Honeypot-Sichtungen0
Betroffene Produkte
agpt:autogpt_classic
Schwachen (CWE)
CWE-77
Referenzen
https://github.com/significant-gravitas/autogpt/commit/1df7d527dd37dff8363dc162fb58d300f072e302(security@huntr.dev)
https://huntr.com/bounties/959efe87-f109-4cef-94d8-90ff2c7aef51(security@huntr.dev)
https://huntr.com/bounties/959efe87-f109-4cef-94d8-90ff2c7aef51(134c704f-9b21-4f2e-91b3-4a467353bcc0)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.