{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-3102","assignerOrgId":"c09c270a-b464-47c1-9133-acb35b22c19a","state":"PUBLISHED","assignerShortName":"@huntr_ai","dateReserved":"2024-03-29T18:43:30.670Z","datePublished":"2024-06-06T18:19:23.450Z","dateUpdated":"2024-11-03T18:27:23.547Z"},"containers":{"cna":{"title":"JSON Injection in mintplex-labs/anything-llm","providerMetadata":{"orgId":"c09c270a-b464-47c1-9133-acb35b22c19a","shortName":"@huntr_ai","dateUpdated":"2024-11-03T18:27:23.547Z"},"descriptions":[{"lang":"en","value":"A JSON Injection vulnerability exists in the `mintplex-labs/anything-llm` application, specifically within the username parameter during the login process at the `/api/request-token` endpoint. The vulnerability arises from improper handling of values, allowing attackers to perform brute force attacks without prior knowledge of the username. Once the password is known, attackers can conduct blind attacks to ascertain the full username, significantly compromising system security."}],"affected":[{"vendor":"mintplex-labs","product":"mintplex-labs/anything-llm","versions":[{"version":"unspecified","lessThan":"1.0.0","status":"affected","versionType":"custom"}]}],"references":[{"url":"https://huntr.com/bounties/8af4650d-5955-44a4-86b4-d08e1c862b49"},{"url":"https://github.com/mintplex-labs/anything-llm/commit/2374939ffb551ab2929d7f9d5827fe6597fa8caa"}],"metrics":[{"cvssV3_0":{"version":"3.0","attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","confidentialityImpact":"LOW","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","baseScore":5.3,"baseSeverity":"MEDIUM"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-307 Improper Restriction of Excessive Authentication Attempts","cweId":"CWE-307"}]}],"source":{"advisory":"8af4650d-5955-44a4-86b4-d08e1c862b49","discovery":"EXTERNAL"}},"adp":[{"affected":[{"vendor":"mintplexlabs","product":"anythingllm","cpes":["cpe:2.3:a:mintplexlabs:anythingllm:-:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThan":"1.0.0","versionType":"custom"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-06-11T14:45:02.550918Z","id":"CVE-2024-3102","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-06-20T13:57:49.007Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-01T19:32:42.847Z"},"title":"CVE Program Container","references":[{"url":"https://huntr.com/bounties/8af4650d-5955-44a4-86b4-d08e1c862b49","tags":["x_transferred"]},{"url":"https://github.com/mintplex-labs/anything-llm/commit/2374939ffb551ab2929d7f9d5827fe6597fa8caa","tags":["x_transferred"]}]}]}}