VYPR
High severityNVD Advisory· Published Mar 20, 2025· Updated Mar 20, 2025

Arbitrary File Download in modelscope/agentscope

CVE-2024-8501

Description

An arbitrary file download vulnerability exists in the rpc_agent_client component of modelscope/agentscope version v0.0.4. This vulnerability allows any user to download any file from the rpc_agent's host by exploiting the download_file method. This can lead to unauthorized access to sensitive information, including configuration files, credentials, and potentially system files, which may facilitate further exploitation such as privilege escalation or lateral movement within the network.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Arbitrary file download in modelscope/agentscope v0.0.4 allows any user to download arbitrary files via the rpc_agent_client component.

Root

Cause

CVE-2024-8501 is an arbitrary file download vulnerability found in the rpc_agent_client component of modelscope/agentscope version v0.0.4. The download_file method does not restrict the target path, enabling an attacker to request any file on the rpc_agent's host. The vulnerability stems from a lack of input validation or path sanitization in this function [1][2].

Exploitation

Conditions

No authentication or special privileges are required to trigger the vulnerability. Any user who can communicate with the rpc_agent can call the download_file method. The attack can be performed remotely if the service is exposed, making it a low-barrier exploit path [3].

Impact

An attacker can download arbitrary files from the rpc_agent's host, including configuration files, credentials, and system files. This information disclosure can lead to further compromise such as privilege escalation or lateral movement within the network [2][3].

Mitigation

As of the published date (2025-03-20), the vendor has not released a patched version. Users should apply network-level controls, restrict access to the rpc_agent, or upgrade to a newer version if a fix becomes available. No workaround has been provided [1][3].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
agentscopePyPI
<= 0.0.4

Affected products

3

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.