Miggo Logo

CVE-2024-39025: Letta (previously MemGPT) incorrect access control vulnerability

7.5

CVSS Score
3.1

Basic Information

EPSS Score
0.31983%
Published
12/27/2024
Updated
1/2/2025
KEV Status
No
Technology
TechnologyPython

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
lettapip<= 0.3.17

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from the GET /users endpoint implementation in users.py. The get_all_users function (lines 55-68 in the shown code) directly accesses user data through server.ms.get_all_users() without any authentication/authorization checks. This matches the CWE-863 description of missing authorization controls. The Medium article specifically calls out this endpoint's lack of access controls, and the code shows no middleware or decorators enforcing privileges. The high confidence comes from direct correlation between the advisory description, CWE classification, and the observed code implementation.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

In*orr**t ****ss *ontrol in t** /us*rs *n*point o* *p**k*r M*m*PT v*.*.** *llows *tt**k*rs to ****ss s*nsitiv* **t*.

Reasoning

T** vuln*r**ility st*ms *rom t** **T /us*rs *n*point impl*m*nt*tion in us*rs.py. T** **t_*ll_us*rs *un*tion (lin*s **-** in t** s*own *o**) *ir**tly ****ss*s us*r **t* t*rou** s*rv*r.ms.**t_*ll_us*rs() wit*out *ny *ut**nti**tion/*ut*oriz*tion ****ks.