| タイトル | griptape v0.19.4 Absolute Path Traversal |
|---|
| 説明 | The `FileManagerTool` (backed by `LocalFileManagerDriver`) in Griptape provides capabilities to list, read, and write files. However, it fails to properly sanitize file paths provided by the LLM. It directly concatenates the llm-supplied path with the working directory.
This allows for a path traversal vulnerability. An attacker can use prompt injection to coerce the LLM into providing paths containing `../` sequences. This enables the agent to:
1. **Read arbitrary files** (e.g., `/etc/passwd`) via `load_files_from_disk`.
2. **List arbitrary directories** via `list_files_from_disk`.
3. **Write to arbitrary files** via `save_content_to_file` or `save_memory_artifacts_to_disk`.
|
|---|
| ソース | ⚠️ https://github.com/Ka7arotto/cve/blob/main/griptape/issue_fileManagerTool/issue.md |
|---|
| ユーザー | Goku (UID 80486) |
|---|
| 送信 | 2026年03月21日 02:57 (17 日 ago) |
|---|
| モデレーション | 2026年04月05日 07:17 (15 days later) |
|---|
| ステータス | 承諾済み |
|---|
| VulDBエントリ | 355389 [griptape-ai griptape 0.19.4 FileManagerTool ディレクトリトラバーサル] |
|---|
| ポイント | 20 |
|---|