Arbitrary Code Execution Vulnerability in MacOS Text-To-Speech Class
CVE-2024-1880
Key Information:
- Vendor
- Significant-gravitas
- Status
- Significant-gravitas/autogpt
- Vendor
- CVE Published:
- 6 June 2024
Summary
An OS command injection vulnerability affects the MacOS Text-To-Speech class (MacOSTTS) within the Significant Gravitas AutoGPT project. This vulnerability is present in versions up to v0.5.0 and stems from the improper handling of special characters in user-inputted text within the _speech
method. By employing os.system
to run shell commands based on user input, it allows for the execution of arbitrary code if an attacker injects shell commands. This risk is particularly present when the AutoGPT instance is initiated with the --speak
option using the TEXT_TO_SPEECH_PROVIDER=macos
configuration. The issue has been resolved in version 5.1.0, emphasizing the need for users to update their installations promptly.
Affected Version(s)
significant-gravitas/autogpt < 5.1.0
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved