提交 #784463: griptape v0.19.4 Absolute Path Traversal信息

标题griptape v0.19.4 Absolute Path Traversal
描述The `FileManagerTool` (backed by `LocalFileManagerDriver`) in Griptape provides capabilities to list, read, and write files. However, it fails to properly sanitize file paths provided by the LLM. It directly concatenates the llm-supplied path with the working directory. This allows for a path traversal vulnerability. An attacker can use prompt injection to coerce the LLM into providing paths containing `../` sequences. This enables the agent to: 1. **Read arbitrary files** (e.g., `/etc/passwd`) via `load_files_from_disk`. 2. **List arbitrary directories** via `list_files_from_disk`. 3. **Write to arbitrary files** via `save_content_to_file` or `save_memory_artifacts_to_disk`.
来源⚠️ https://github.com/Ka7arotto/cve/blob/main/griptape/issue_fileManagerTool/issue.md
用户
 Goku (UID 80486)
提交2026-03-21 02時57分 (17 日前)
管理2026-04-05 07時17分 (15 days later)
状态已接受
VulDB条目355389 [griptape-ai griptape 0.19.4 FileManagerTool 目录遍历]
积分20

Want to know what is going to be exploited?

We predict KEV entries!