Lucene search

K
cvelist@huntr_aiCVELIST:CVE-2024-3121
HistoryJun 24, 2024 - 12:00 a.m.

CVE-2024-3121 Remote Code Execution in create_conda_env function in parisneo/lollms

2024-06-2400:00:14
CWE-94
@huntr_ai
www.cve.org
10
cve-2024-3121
parisneo/lollms
subprocess.popen
security breach
env_name
python_version
whoami command

CVSS3

6.8

Attack Vector

PHYSICAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0

Percentile

16.6%

A remote code execution vulnerability exists in the create_conda_env function of the parisneo/lollms repository, version 5.9.0. The vulnerability arises from the use of shell=True in the subprocess.Popen function, which allows an attacker to inject arbitrary commands by manipulating the env_name and python_version parameters. This issue could lead to a serious security breach as demonstrated by the ability to execute the ‘whoami’ command among potentially other harmful commands.

CNA Affected

[
  {
    "vendor": "parisneo",
    "product": "parisneo/lollms",
    "versions": [
      {
        "version": "unspecified",
        "status": "affected",
        "versionType": "custom",
        "lessThanOrEqual": "latest"
      }
    ]
  }
]

CVSS3

6.8

Attack Vector

PHYSICAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0

Percentile

16.6%

Related for CVELIST:CVE-2024-3121