CVE-2024-45189

6.5 MEDIUM

📋 TL;DR

Mage AI has a path traversal vulnerability in its Git Content request that allows remote users with the 'Viewer' role to read arbitrary files from the server. This affects Mage AI deployments where untrusted users have Viewer access. The vulnerability enables unauthorized file disclosure without requiring administrative privileges.

💻 Affected Systems

Products:
  • Mage AI
Versions: Versions before the fix
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires a user with Viewer role or higher; Mage AI deployments with public-facing interfaces are particularly vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could read sensitive files like configuration files, API keys, database credentials, and source code, potentially leading to full system compromise.

🟠

Likely Case

Unauthorized access to sensitive configuration files and source code, enabling further attacks or intellectual property theft.

🟢

If Mitigated

Limited impact if proper access controls restrict Viewer roles to trusted users only.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires Viewer role credentials; the vulnerability is publicly documented with proof-of-concept details available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Mage AI releases after vulnerability disclosure

Vendor Advisory: https://research.jfrog.com/vulnerabilities/mage-ai-git-content-request-remote-arbitrary-file-leak-jfsa-2024-001039604/

Restart Required: Yes

Instructions:

1. Update Mage AI to the latest patched version
2. Restart the Mage AI service
3. Verify the fix by testing the Git Content endpoint

🔧 Temporary Workarounds

Restrict Viewer Role Access

all

Limit Viewer role assignments to trusted users only and implement network-level access controls.

Network Segmentation

all

Isolate Mage AI instances from sensitive systems and implement firewall rules to restrict access.

🧯 If You Can't Patch

  • Implement strict access controls for Viewer roles and monitor for suspicious file access patterns.
  • Deploy web application firewall (WAF) rules to block path traversal attempts.

🔍 How to Verify

Check if Vulnerable:

Test if a user with Viewer role can access files outside the intended directory via the Git Content endpoint.

Check Version:

Check Mage AI version in the application interface or deployment configuration.

Verify Fix Applied:

After patching, verify that path traversal attempts via the Git Content endpoint are properly blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns in Mage AI logs
  • Multiple failed path traversal attempts

Network Indicators:

  • HTTP requests to Git Content endpoint with directory traversal sequences (../)

SIEM Query:

source="mage-ai" AND (uri="*../*" OR status=403)

🔗 References

📤 Share & Export