Lucene search

K
cve@huntr_aiCVE-2024-3435
HistoryMay 16, 2024 - 9:15 a.m.

CVE-2024-3435

2024-05-1609:15:14
CWE-29
@huntr_ai
web.nvd.nist.gov
32
path traversal
save_settings endpoint
parisneo/lollms-webui
remote code execution
json payloads
vulnerability
configuration
bypassing patches
nvd

CVSS3

8.4

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

7.6

Confidence

Low

EPSS

0

Percentile

9.0%

A path traversal vulnerability exists in the ‘save_settings’ endpoint of the parisneo/lollms-webui application, affecting versions up to the latest release before 9.5. The vulnerability arises due to insufficient sanitization of the ‘config’ parameter in the ‘apply_settings’ function, allowing an attacker to manipulate the application’s configuration by sending specially crafted JSON payloads. This could lead to remote code execution (RCE) by bypassing existing patches designed to mitigate such vulnerabilities.

Affected configurations

Vulners
Vulnrichment
Node
parisneolollms_web_uiMatch9.5
VendorProductVersionCPE
parisneolollms_web_ui9.5cpe:2.3:a:parisneo:lollms_web_ui:9.5:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "parisneo",
    "product": "parisneo/lollms-webui",
    "versions": [
      {
        "version": "unspecified",
        "lessThan": "9.5",
        "status": "affected",
        "versionType": "custom"
      }
    ]
  }
]

CVSS3

8.4

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

7.6

Confidence

Low

EPSS

0

Percentile

9.0%