Products
XLANG OpenAgents
- through fe73ac4
Source
cve@mitre.org
Tags
CVE-2024-34524 details
Published : May 6, 2024, 12:15 a.m.
Last Modified : May 6, 2024, 12:44 p.m.
Last Modified : May 6, 2024, 12:44 p.m.
Description
In XLANG OpenAgents through fe73ac4, the allowed_file protection mechanism can be bypassed by using an incorrect file extension for the nature of the file content.
CVSS Score
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 |
---|
Weakness
Weakness | Name | Description |
---|
References
URL | Source |
---|---|
https://github.com/xlang-ai/OpenAgents/blob/880e26adfe380e999962fc645fc8fc80bd72f103/backend/utils/utils.py#L31 | cve@mitre.org |
https://github.com/xlang-ai/OpenAgents/issues/112 | cve@mitre.org |
This website uses the NVD API, but is not approved or certified by it.