CVE-2024-9431

8.8 HIGH

📋 TL;DR

This vulnerability in transformeroptimus/superagi v0.0.14 allows authenticated users to change other users' passwords after logging in, enabling account takeover. Any deployment using this vulnerable version is affected, particularly multi-user environments where privilege separation is critical.

💻 Affected Systems

Products:
  • transformeroptimus/superagi
Versions: v0.0.14
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments of the affected version are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Malicious authenticated user takes over administrative accounts, gains full system control, and potentially compromises the entire application and its data.

🟠

Likely Case

Regular users escalate privileges by taking over other user accounts, leading to unauthorized access to sensitive data and functionality.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to temporary account disruption until password reset procedures are followed.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated access but exploitation is straightforward once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v0.0.15 or later

Vendor Advisory: https://huntr.com/bounties/9b33d7c1-ed0a-4f5b-a378-694570fd990b

Restart Required: No

Instructions:

1. Update superagi to version v0.0.15 or later. 2. Verify the update was successful. 3. No restart required for this fix.

🔧 Temporary Workarounds

Implement custom authorization middleware

all

Add server-side authorization checks to ensure users can only modify their own accounts

🧯 If You Can't Patch

  • Implement strict network segmentation to limit access to the application
  • Enable detailed audit logging for all password change operations and monitor for suspicious activity

🔍 How to Verify

Check if Vulnerable:

Check if running superagi version v0.0.14. Attempt to change another user's password while authenticated as a different user.

Check Version:

Check package.json or application configuration for superagi version

Verify Fix Applied:

After updating, attempt to change another user's password while authenticated as a different user - this should fail with proper authorization error.

📡 Detection & Monitoring

Log Indicators:

  • Multiple password change requests from same user targeting different accounts
  • Password change operations where requester ID differs from target user ID

Network Indicators:

  • Unusual pattern of POST requests to password change endpoints

SIEM Query:

source="superagi" AND (event="password_change" OR event="user_update") AND user_id != target_user_id

🔗 References

📤 Share & Export