GHSA-766v-q9x3-g744: PraisonAI has Memory State Leakage and Path Traversal in MultiAgent Context Handling
The MultiAgentLedger and MultiAgentMonitor components in the provided code exhibit vulnerabilities that can lead to context leakage and arbitrary file operations. Specifically:
- Memory State Leakage via Agent ID Collision: The
MultiAgentLedgeruses a dictionary to store ledgers by agent ID without enforcing uniqueness. This allows agents with the same ID to share ledger instances, leading to potential leakage of sensitive context data. - Path Traversal in MultiAgentMonitor: The
MultiAgentMonitorconstructs file paths by concatenating thebase_pathand agent ID without sanitization. This allows an attacker to escape the intended directory using path traversal sequences (e.g.,../), potentially leading to arbitrary file read/write.
References
Code Behaviors & Features
Detect and mitigate GHSA-766v-q9x3-g744 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →