{"uuid": "48ef994b-effa-4039-9e73-c410e9a6d662", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13059", "type": "seen", "source": "https://t.me/cvedetector/17597", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13059 - Apache Anything-LLM Path Traversal RCE\", \n  \"Content\": \"CVE ID : CVE-2024-13059 \nPublished : Feb. 10, 2025, 7:15 p.m. | 27\u00a0minutes ago \nDescription : A vulnerability in mintplex-labs/anything-llm prior to version 1.3.1 allows for path traversal due to improper handling of non-ASCII filenames in the multer library. This vulnerability can lead to arbitrary file write, which can subsequently result in remote code execution. The issue arises when the filename transformation introduces '../' sequences, which are not sanitized by multer, allowing attackers with manager or admin roles to write files to arbitrary locations on the server. \nSeverity: 7.2 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-10T21:16:47.000000Z"}