Cyber Posture

CVE-2024-9617

N/A

Published: 20 March 2025

Published
20 March 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score N/A
EPSS Score 0.1556 94.7th percentile
Risk Priority 9 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-9617 is a uncategorised-severity Authorization Bypass Through User-Controlled Key (CWE-639) vulnerability. Its CVSS base score is N/A.

Operationally, exploitation aligns with the MITRE ATT&CK technique File and Directory Discovery (T1083); ranked in the top 5.3% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

This vulnerability is AI-related — categorised as Enterprise AI Assistants; in the Privacy and Disclosure risk domain.

The strongest mitigations our analysis identified are NIST 800-53 AC-24 (Access Control Decisions) and AC-3 (Access Enforcement).

Threat & Defense at a Glance

What attackers do: exploitation maps to File and Directory Discovery (T1083) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires the application to enforce approved authorizations, directly preventing unauthorized access to files by verifying user ownership before serving contents via the API.

prevent

Mandates access control decisions based on policy, such as confirming the requester is the file creator prior to disclosure.

prevent

Employs least privilege to ensure users only access their own files, mitigating broad unauthorized read access across all files.

MITRE ATT&CK Enterprise TechniquesAI

T1083 File and Directory Discovery Discovery
Adversaries may enumerate files and directories or may search in specific locations of a host or network share for certain information within a file system.
T1213.005 Messaging Applications Collection
Adversaries may leverage chat and messaging applications, such as Microsoft Teams, Google Chat, and Slack, to mine valuable information.
Why these techniques?

The IDOR vulnerability enables unauthorized access to any user's files via the chat API without ownership verification, facilitating file and directory discovery (T1083) and data collection from messaging/chat applications (T1213.005).

NVD Description

An IDOR vulnerability in danswer-ai/danswer v0.3.94 allows an attacker to view any files. The application does not verify whether the attacker is the creator of the file, allowing the attacker to directly call the GET /api/chat/file/{file_id} interface to view any…

more

user's file.

Deeper analysisAI

CVE-2024-9617 is an Insecure Direct Object Reference (IDOR) vulnerability, classified under CWE-639, affecting danswer-ai/danswer version 0.3.94. The flaw occurs because the application fails to verify whether a requesting user is the creator of a file before serving its contents. Specifically, attackers can directly invoke the GET /api/chat/file/{file_id} endpoint with any file identifier to access files belonging to other users.

Any authenticated user within the danswer-ai/danswer environment can exploit this vulnerability by supplying an arbitrary file_id in the API request, bypassing access controls. Successful exploitation grants unauthorized read access to sensitive files uploaded by other users, potentially exposing confidential data depending on what was stored.

The primary advisory is documented on Huntr at https://huntr.com/bounties/8f683ff6-3a99-41c6-b763-a8f7b73bd146, which details the issue reported via their bug bounty program. No specific patch or mitigation steps are outlined in the provided CVE information.

Details

CWE(s)

AI Security AnalysisAI

AI Category
Enterprise AI Assistants
Risk Domain
Privacy and Disclosure
OWASP Top 10 for LLMs 2025
None mapped
Classification Reason
Danswer (danswer-ai/danswer) is an open-source enterprise AI search and chat assistant platform, fitting the Enterprise AI Assistants category.

CVEs Like This One

CVE-2024-8613Shared CWE-639
CVE-2026-28788Shared CWE-639
CVE-2026-32589Shared CWE-639
CVE-2026-5845Shared CWE-639
CVE-2026-25147Shared CWE-639
CVE-2025-40805Shared CWE-639
CVE-2026-4503Shared CWE-639
CVE-2026-40600Shared CWE-639
CVE-2023-53955Shared CWE-639
CVE-2026-28216Shared CWE-639

References