Python code execution sandbox escape in non-docker version in Auto-GPT
CVE-2023-37274

7.6HIGH

Key Information:

Status
Vendor
CVE Published:
13 July 2023

What is CVE-2023-37274?

Auto-GPT, an experimental open-source application, has a vulnerability that arises from improper handling of the 'basename' argument within the 'execute_python_code' command. This flaw allows malicious actors to perform a path traversal attack by supplying a crafted basename, potentially overwriting important .py files outside the intended workspace directory. If exploited, this could lead to arbitrary code execution on the host system, as the overwritten scripts may be executed with the next start of Auto-GPT. The vulnerability has been addressed in version 0.4.3. To mitigate risks, users are advised to run Auto-GPT in a secured environment such as a virtual machine to prevent any potential damage to critical files.

Affected Version(s)

Auto-GPT < 0.4.3

References

CVSS V3.1

Score:
7.6
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
High
Privileges Required:
Low
User Interaction:
Required
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2023-37274 : Python code execution sandbox escape in non-docker version in Auto-GPT