9.8
CRITICAL
CVE-2024-6091
Apache Autogpt Command Bypass
Description

A vulnerability in significant-gravitas/autogpt version 0.5.1 allows an attacker to bypass the shell commands denylist settings. The issue arises when the denylist is configured to block specific commands, such as 'whoami' and '/bin/whoami'. An attacker can circumvent this restriction by executing commands with a modified path, such as '/bin/./whoami', which is not recognized by the denylist.

INFO

Published Date :

Sept. 11, 2024, 1:15 p.m.

Last Modified :

Sept. 18, 2024, 6:41 p.m.

Remotely Exploitable :

Yes !

Impact Score :

5.9

Exploitability Score :

3.9
Public PoC/Exploit Available at Github

CVE-2024-6091 has a 4 public PoC/Exploit available at Github. Go to the Public Exploits tab to see the list.

Affected Products

The following products are affected by CVE-2024-6091 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Agpt autogpt
References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2024-6091.

URL Resource
https://github.com/significant-gravitas/autogpt/commit/ef691359b774a1f9f80cf4f5ace9821967b718ed Patch
https://huntr.com/bounties/8a742c13-bb5e-4bc9-8b86-049d8a386050 Exploit Third Party Advisory

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

None

Python

Updated: 1 week, 3 days ago
0 stars 0 fork 0 watcher
Born at : Feb. 12, 2025, 5:54 a.m. This repo has been linked 8 different CVEs too.

None

Python

Updated: 1 week, 3 days ago
0 stars 0 fork 0 watcher
Born at : Feb. 11, 2025, 9:29 a.m. This repo has been linked 8 different CVEs too.

vulnerable version of demo_math_ops package

Python

Updated: 2 weeks, 2 days ago
0 stars 0 fork 0 watcher
Born at : Feb. 5, 2025, 2:13 a.m. This repo has been linked 6 different CVEs too.

With few vulnerable packages..

Python

Updated: 2 weeks, 4 days ago
1 stars 0 fork 0 watcher
Born at : Feb. 1, 2025, 9:55 a.m. This repo has been linked 8 different CVEs too.

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2024-6091 vulnerability anywhere in the article.

  • Cybersecurity News
Matrix Discloses High-Severity Vulnerabilities in Encryption Key Sharing

The Matrix.org Security Team has recently disclosed two high-severity vulnerabilities impacting the matrix-js-sdk and matrix-react-sdk. These vulnerabilities, related to MSC3061 (a specification for s ... Read more

Published Date: Oct 17, 2024 (4 months ago)
  • Cybersecurity News
Cacti Network Monitoring Tool Patches Security Flaws, Including RCE Vulnerability

Popular open-source network monitoring tool, Cacti, has released an urgent security update addressing multiple vulnerabilities, including a critical Remote Code Execution (RCE) flaw.The update, versio ... Read more

Published Date: Oct 07, 2024 (4 months, 2 weeks ago)
  • Cybersecurity News
166k+ Projects at Risk: AutoGPT’s Critical Vulnerability Explained – CVE-2024-6091 (CVSS 9.8)

A significant security vulnerability has been discovered in AutoGPT, a powerful AI tool designed to automate tasks through intelligent agents. With over 166k stars on GitHub, AutoGPT has gained popula ... Read more

Published Date: Sep 17, 2024 (5 months ago)

The following table lists the changes that have been made to the CVE-2024-6091 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • Initial Analysis by [email protected]

    Sep. 18, 2024

    Action Type Old Value New Value
    Added CVSS V3.1 NIST AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    Changed Reference Type https://github.com/significant-gravitas/autogpt/commit/ef691359b774a1f9f80cf4f5ace9821967b718ed No Types Assigned https://github.com/significant-gravitas/autogpt/commit/ef691359b774a1f9f80cf4f5ace9821967b718ed Patch
    Changed Reference Type https://huntr.com/bounties/8a742c13-bb5e-4bc9-8b86-049d8a386050 No Types Assigned https://huntr.com/bounties/8a742c13-bb5e-4bc9-8b86-049d8a386050 Exploit, Third Party Advisory
    Added CPE Configuration OR *cpe:2.3:a:agpt:autogpt:0.5.1:*:*:*:*:*:*:*
  • CVE Received by [email protected]

    Sep. 11, 2024

    Action Type Old Value New Value
    Added Description A vulnerability in significant-gravitas/autogpt version 0.5.1 allows an attacker to bypass the shell commands denylist settings. The issue arises when the denylist is configured to block specific commands, such as 'whoami' and '/bin/whoami'. An attacker can circumvent this restriction by executing commands with a modified path, such as '/bin/./whoami', which is not recognized by the denylist.
    Added Reference huntr.dev https://huntr.com/bounties/8a742c13-bb5e-4bc9-8b86-049d8a386050 [No types assigned]
    Added Reference huntr.dev https://github.com/significant-gravitas/autogpt/commit/ef691359b774a1f9f80cf4f5ace9821967b718ed [No types assigned]
    Added CWE huntr.dev CWE-78
    Added CVSS V3 huntr.dev AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2024-6091 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

CVSS31 - Vulnerability Scoring System
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability