漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
labsai/eddi Vulnerable to Path Traversal (Zip Slip) in ZIP Import Function
Vulnerability Description
E.D.D.I (Enhanced Dialog Driven Interface) is a middleware to connect and manage LLM API bots. In versions before 5.5.0, an attacker with access to the `/backup/import` API endpoint can write arbitrary files to locations outside the intended extraction directory due to a Zip Slip vulnerability. Although the application runs as a non-root user (`185`), limiting direct impact on system-level files, this vulnerability can still be exploited to overwrite application files (e.g., JAR libraries) owned by the application user. This overwrite can potentially lead to Remote Code Execution (RCE) within the application's context. This issue has been patched in version 5.5.0.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
Vulnerability Type
对路径名的限制不恰当(路径遍历)
Vulnerability Title
E.D.D.I 路径遍历漏洞
Vulnerability Description
E.D.D.I是LABS.AI开源的一种中间件,用于连接和管理 LLM API 机器人。 E.D.D.I 5.5.0之前版本存在路径遍历漏洞,该漏洞源于Zip Slip漏洞,可能导致任意文件写入和远程代码执行。
CVSS Information
N/A
Vulnerability Type
N/A