Arbitrary File Download in modelscope/agentscope
Description
An arbitrary file download vulnerability exists in the rpc_agent_client component of modelscope/agentscope version v0.0.4. This vulnerability allows any user to download any file from the rpc_agent's host by exploiting the download_file method. This can lead to unauthorized access to sensitive information, including configuration files, credentials, and potentially system files, which may facilitate further exploitation such as privilege escalation or lateral movement within the network.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Arbitrary file download in modelscope/agentscope v0.0.4 allows any user to download arbitrary files via the rpc_agent_client component.
Root
Cause
CVE-2024-8501 is an arbitrary file download vulnerability found in the rpc_agent_client component of modelscope/agentscope version v0.0.4. The download_file method does not restrict the target path, enabling an attacker to request any file on the rpc_agent's host. The vulnerability stems from a lack of input validation or path sanitization in this function [1][2].
Exploitation
Conditions
No authentication or special privileges are required to trigger the vulnerability. Any user who can communicate with the rpc_agent can call the download_file method. The attack can be performed remotely if the service is exposed, making it a low-barrier exploit path [3].
Impact
An attacker can download arbitrary files from the rpc_agent's host, including configuration files, credentials, and system files. This information disclosure can lead to further compromise such as privilege escalation or lateral movement within the network [2][3].
Mitigation
As of the published date (2025-03-20), the vendor has not released a patched version. Users should apply network-level controls, restrict access to the rpc_agent, or upgrade to a newer version if a fix becomes available. No workaround has been provided [1][3].
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
agentscopePyPI | <= 0.0.4 | — |
Affected products
3- Range: = v0.0.4
- modelscope/modelscope/agentscopev5Range: unspecified
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3News mentions
0No linked articles in our index yet.