CVE-2024-10902
Published: 20 March 2025
Summary
CVE-2024-10902 is a critical-severity Path Traversal (CWE-22) vulnerability in Dbgpt Db-Gpt. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 17.1% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
This vulnerability is AI-related — categorised as Other Platforms.
The strongest mitigations our analysis identified are NIST 800-53 AC-6 (Least Privilege) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly requires validation of inputs like file paths and names to block path traversal and arbitrary file writes exploited in this CVE.
Applies least privilege to the web application process, preventing malicious file writes to sensitive locations like Python site-packages even if upload succeeds.
Restricts classes of inputs to limit file uploads to authorized types and safe paths, mitigating arbitrary upload risks.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The CVE describes an arbitrary file upload vulnerability with path traversal in a public-facing web API, directly enabling exploitation of public-facing applications (T1190) and allowing upload of malicious Python code (e.g., __init__.py to site-packages) for RCE via the Python interpreter (T1059.006).
NVD Description
In eosphoros-ai/db-gpt version v0.6.0, the web API `POST /v1/personal/agent/upload` is vulnerable to Arbitrary File Upload with Path Traversal. This vulnerability allows unauthorized attackers to upload arbitrary files to the victim's file system at any location. The impact of this vulnerability…
more
includes the potential for remote code execution (RCE) by writing malicious files, such as a malicious `__init__.py` in the Python's `/site-packages/` directory.
Deeper analysisAI
CVE-2024-10902, published on 2025-03-20, is an Arbitrary File Upload vulnerability with Path Traversal in eosphoros-ai/db-gpt version v0.6.0. The affected component is the web API endpoint `POST /v1/personal/agent/upload`, which fails to properly validate file paths, enabling attackers to write arbitrary files to any location on the victim's file system.
The vulnerability has a CVSS score of 9.8 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and is associated with CWE-22. Unauthorized remote attackers can exploit it with low complexity, no privileges, and no user interaction required. Exploitation allows uploading malicious files anywhere, potentially leading to remote code execution (RCE), such as by writing a malicious `__init__.py` file to Python's `/site-packages/` directory.
Mitigation details are available in the Huntr advisory at https://huntr.com/bounties/f7fbf76e-aa1c-4106-b007-e9579f4f7d5f.
Details
- CWE(s)
Affected Products
AI Security AnalysisAI
- AI Category
- Other Platforms
- Risk Domain
- N/A
- OWASP Top 10 for LLMs 2025
- None mapped
- Classification Reason
- Regex match