| タイトル | PromtEngineer localGPT Latest (commit: 4d41c7d) Arbitrary File Read |
|---|
| 説明 | A critical vulnerability chain exists in localGPT's RAG (Retrieval-Augmented Generation) system that allows any unauthenticated attacker to read arbitrary files from the server and extract their complete contents through the web interface. The vulnerability combines two separate flaws:
By chaining these vulnerabilities, an attacker can:
Read sensitive configuration files containing passwords, API keys, and database credentials
Extract user data and system information
Access AWS credentials, SSH keys, and other secrets
Perform all actions without any authentication
This is a zero-click, pre-authentication remote code execution equivalent that leads to complete system compromise. |
|---|
| ソース | ⚠️ https://github.com/August829/CVEP/issues/10 |
|---|
| ユーザー | Yu_Bao (UID 89348) |
|---|
| 送信 | 2026年03月13日 03:53 (25 日 ago) |
|---|
| モデレーション | 2026年03月27日 14:49 (14 days later) |
|---|
| ステータス | 承諾済み |
|---|
| VulDBエントリ | 353890 [PromtEngineer localGPT 迄 4d41c7d1713b16b216d8e062e51a5dd88b20b054 Web Interface rag_system/api_server.py handle_index 情報漏えい] |
|---|
| ポイント | 20 |
|---|