CVE-2024-39025

7.5 HIGH

📋 TL;DR

CVE-2024-39025 is an incorrect access control vulnerability in the /users endpoint of Cpacker MemGPT v0.3.17 that allows attackers to access sensitive user data without proper authorization. This affects all deployments running the vulnerable version of Cpacker MemGPT. Attackers can exploit this to view potentially confidential information stored in user accounts.

💻 Affected Systems

Products:
  • Cpacker MemGPT
Versions: v0.3.17
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Cpacker MemGPT v0.3.17; earlier or later versions may not be affected. The vulnerability is in the web application layer.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain unauthorized access to all user data including potentially sensitive personal information, credentials, or private content, leading to data breach and privacy violations.

🟠

Likely Case

Unauthenticated or low-privileged users access user data they shouldn't have permission to view, compromising data confidentiality.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to authorized users accessing only their own data as intended.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability involves improper access control on an API endpoint, making exploitation straightforward once the endpoint is discovered.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v0.3.18 or later

Vendor Advisory: https://github.com/letta-ai/letta/releases/tag/0.3.17

Restart Required: Yes

Instructions:

1. Upgrade to Cpacker MemGPT v0.3.18 or later. 2. Restart the MemGPT service. 3. Verify the /users endpoint now requires proper authentication and authorization.

🔧 Temporary Workarounds

Network Access Restriction

linux

Restrict network access to the MemGPT service to only trusted IP addresses or networks.

# Example using iptables: iptables -A INPUT -p tcp --dport [MEMGPT_PORT] -s [TRUSTED_IP] -j ACCEPT
# iptables -A INPUT -p tcp --dport [MEMGPT_PORT] -j DROP

Web Application Firewall Rule

all

Configure WAF to block unauthorized access to /users endpoint.

# WAF specific configuration depends on vendor

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate the MemGPT instance from untrusted networks.
  • Deploy a reverse proxy with authentication and authorization checks before forwarding requests to the /users endpoint.

🔍 How to Verify

Check if Vulnerable:

Attempt to access the /users endpoint without proper authentication. If user data is returned, the system is vulnerable.

Check Version:

Check the MemGPT version in the application interface or configuration files.

Verify Fix Applied:

After patching, attempt to access the /users endpoint without authentication. It should return an authentication error or no data.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to /users endpoint
  • Multiple failed authentication attempts followed by successful /users access

Network Indicators:

  • Unusual traffic patterns to /users endpoint from unexpected sources
  • HTTP requests to /users without proper authentication headers

SIEM Query:

source="memgpt.logs" AND (url_path="/users" AND NOT (user_authenticated="true" AND user_authorized="true"))

🔗 References

📤 Share & Export