← Voltar para CVEs
CVE-2024-8156
CRITICAL9.8
Descricao
A command injection vulnerability exists in the workflow-checker.yml workflow of significant-gravitas/autogpt. The untrusted user input `github.head.ref` is used insecurely, allowing an attacker to inject arbitrary commands. This vulnerability affects versions up to and including the latest version. An attacker can exploit this by creating a branch name with a malicious payload and opening a pull request, potentially leading to reverse shell access or theft of sensitive tokens and keys.
Detalhes CVE
Pontuacao CVSS v3.19.8
SeveridadeCRITICAL
Vetor CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vetor de ataqueNETWORK
ComplexidadeLOW
Privilegios necessariosNONE
Interacao do usuarioNONE
Publicado3/20/2025
Ultima modificacao10/15/2025
Fontenvd
Avistamentos honeypot0
Produtos afetados
agpt:autogpt_classic
Fraquezas (CWE)
CWE-77
Referencias
https://github.com/significant-gravitas/autogpt/commit/1df7d527dd37dff8363dc162fb58d300f072e302(security@huntr.dev)
https://huntr.com/bounties/959efe87-f109-4cef-94d8-90ff2c7aef51(security@huntr.dev)
https://huntr.com/bounties/959efe87-f109-4cef-94d8-90ff2c7aef51(134c704f-9b21-4f2e-91b3-4a467353bcc0)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.