aegra-api@0.9.2

Aegra core API - Self-hosted Agent Protocol server

  • latest version

    0.9.17

  • latest non vulnerable version

  • first published

    3 months ago

  • latest version published

    52 minutes ago

  • licenses detected

  • Direct Vulnerabilities

    Known vulnerabilities in the aegra-api package. This does not include vulnerabilities belonging to this package’s dependencies.

    Fix vulnerabilities automatically

    Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

    Fix for free
    VulnerabilityVulnerable Version
    • H
    Authorization Bypass Through User-Controlled Key

    aegra-api is an Aegra core API - Self-hosted Agent Protocol server

    Affected versions of this package are vulnerable to Authorization Bypass Through User-Controlled Key in the POST /threads/{thread_id}/runs, POST /threads/{thread_id}/runs/stream, and POST /threads/{thread_id}/runs/wait endpoints when thread ownership is not properly verified against the authenticated user. An attacker can gain unauthorized access to another user's thread data, execute actions on behalf of other users, and read or inject messages into another user's conversation history by supplying a valid thread_id belonging to a different user. This is only exploitable if the deployment has multiple authenticated users on a shared instance and no custom authorization handler is registered for thread run creation.

    How to fix Authorization Bypass Through User-Controlled Key?

    Upgrade aegra-api to version 0.9.7 or higher.

    [0.9.0,0.9.7)