CVE-2024-8438 – agentscope
Package
Manager: pip
Name: agentscope
Vulnerable Version: >=0 <=0.0.4
Severity
Level: High
CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00084 pctl0.25371
Details
AgentScope Path Traversal in /api/file A path traversal vulnerability exists in modelscope/agentscope version v.0.0.4. The API endpoint `/api/file` does not properly sanitize the `path` parameter, allowing an attacker to read arbitrary files on the server.
Metadata
Created: 2025-03-20T12:32:48Z
Modified: 2025-03-20T20:50:09Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/03/GHSA-f4hc-q562-cc5r/GHSA-f4hc-q562-cc5r.json
CWE IDs: ["CWE-22"]
Alternative ID: GHSA-f4hc-q562-cc5r
Finding: F063
Auto approve: 1