Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2023-37273
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Docker escape in Auto-GPT when running from docker-compose.yml included in git repo
Source: NVD (National Vulnerability Database)
Vulnerability Description
Auto-GPT is an experimental open-source application showcasing the capabilities of the GPT-4 language model. Running Auto-GPT version prior to 0.4.3 by cloning the git repo and executing `docker compose run auto-gpt` in the repo root uses a different docker-compose.yml file from the one suggested in the official docker set up instructions. The docker-compose.yml file located in the repo root mounts itself into the docker container without write protection. This means that if malicious custom python code is executed via the `execute_python_file` and `execute_python_code` commands, it can overwrite the docker-compose.yml file and abuse it to gain control of the host system the next time Auto-GPT is started. The issue has been patched in version 0.4.3.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:L
Source: NVD (National Vulnerability Database)
Vulnerability Type
对生成代码的控制不恰当(代码注入)
Source: NVD (National Vulnerability Database)
Vulnerability Title
Auto-GPT 代码注入漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Auto-GPT是Significant Gravitas开源的一个人工智能软件代理程序。 Auto-GPT 0.4.3之前版本存在代码注入漏洞,该漏洞源于位于存储库根目录中的 docker-compose.yml 文件将自身安装到 docker 容器中,且没有写保护,如果通过和命令执行恶意自定义 python 代码,它可以覆盖 docker-compose.yml 文件并在下次 Auto-GPT 启动时来获得对主机系统的控制。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
Significant-GravitasAuto-GPT < 0.4.3 -
II. Public POCs for CVE-2023-37273
#POC DescriptionSource LinkShenlong Link
1Site containing info useful for demonstrate CVE-2023-37273https://github.com/gdesantis01/instructions-summarizingPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2023-37273
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2023-37273

No comments yet


Leave a comment