We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-7957

Arbitrary File Overwrite in danswer-ai/danswer



Description

An arbitrary file overwrite vulnerability exists in the ZulipConnector of danswer-ai/danswer, affecting the latest version. The vulnerability arises from the load_credentials method, where user-controlled input for realm_name and zuliprc_content is used to construct file paths and write file contents. This allows attackers to overwrite or create arbitrary files if a zuliprc- directory already exists in the temporary directory.

Reserved 2024-08-19 | Published 2025-03-20 | Updated 2025-03-20 | Assigner @huntr_ai


CRITICAL: 9.1CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H

Problem types

CWE-29 Path Traversal: '\..\filename'

Product status

Any version
affected

References

huntr.com/bounties/21e9b909-036c-4544-ad35-6a5117836275

cve.org (CVE-2024-7957)

nvd.nist.gov (CVE-2024-7957)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2024-7957

Support options

Helpdesk Chat, Email, Knowledgebase