Vulnerability in parisneo/lollms software allows arbitrary code execution via unInstall_binding endpoint due to insufficient input sanitization
Reporter | Title | Published | Views | Family All 7 |
---|---|---|---|---|
![]() | GHSA-PWC9-Q4HJ-PG8G LoLLMS Command Injection vulnerability | 16 May 202409:33 | – | osv |
![]() | CVE-2024-4078 | 16 May 202409:15 | – | osv |
![]() | CVE-2024-4078 Arbitrary Code Execution in parisneo/lollms | 16 May 202409:03 | – | vulnrichment |
![]() | LoLLMS Command Injection vulnerability | 16 May 202409:33 | – | github |
![]() | CVE-2024-4078 Arbitrary Code Execution in parisneo/lollms | 16 May 202409:03 | – | cvelist |
![]() | CVE-2024-4078 | 16 May 202409:15 | – | nvd |
![]() | Arbitrary Code Execution | 29 May 202409:12 | – | veracode |
[
{
"vendor": "parisneo",
"product": "parisneo/lollms",
"versions": [
{
"version": "unspecified",
"lessThan": "main",
"status": "affected",
"versionType": "custom"
}
]
}
]
Parameter | Position | Path | Description | CWE |
---|---|---|---|---|
name | query param | /unInstall_binding | Arbitrary code execution due to insufficient sanitization of user input in the 'name' parameter. | CWE-77 |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo