{"uuid": "c223adb3-2d4f-4c80-a669-f78240dcb16f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-8196", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/8189", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-8196\n\ud83d\udd25 CVSS Score: 9.8 (cvssV3_0, Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: In mintplex-labs/anything-llm v1.5.11 desktop version for Windows, the application opens server port 3001 on 0.0.0.0 with no authentication by default. This vulnerability allows an attacker to gain full backend access, enabling them to perform actions such as deleting all data from the workspace.\n\ud83d\udccf Published: 2025-03-20T10:11:34.868Z\n\ud83d\udccf Modified: 2025-03-20T10:11:34.868Z\n\ud83d\udd17 References:\n1. https://huntr.com/bounties/dbde1c71-7aa5-46f6-847a-d89793cf97a9\n2. https://github.com/mintplex-labs/anything-llm/commit/9bfe477f10b188bfe3508ac29105df80d4522ece", "creation_timestamp": "2025-03-20T10:19:28.000000Z"}