| 제목 | PromtEngineer localGPT Latest (commit: 4d41c7d) Arbitrary File Read |
|---|
| 설명 | A critical vulnerability chain exists in localGPT's RAG (Retrieval-Augmented Generation) system that allows any unauthenticated attacker to read arbitrary files from the server and extract their complete contents through the web interface. The vulnerability combines two separate flaws:
By chaining these vulnerabilities, an attacker can:
Read sensitive configuration files containing passwords, API keys, and database credentials
Extract user data and system information
Access AWS credentials, SSH keys, and other secrets
Perform all actions without any authentication
This is a zero-click, pre-authentication remote code execution equivalent that leads to complete system compromise. |
|---|
| 원천 | ⚠️ https://github.com/August829/CVEP/issues/10 |
|---|
| 사용자 | Yu_Bao (UID 89348) |
|---|
| 제출 | 2026. 03. 13. AM 03:53 (25 날 ago) |
|---|
| 모더레이션 | 2026. 03. 27. PM 02:49 (14 days later) |
|---|
| 상태 | 수락 |
|---|
| VulDB 항목 | 353890 [PromtEngineer localGPT 까지 4d41c7d1713b16b216d8e062e51a5dd88b20b054 Web Interface rag_system/api_server.py handle_index 정보 공개] |
|---|
| 포인트들 | 20 |
|---|