Lucene search

K
cvelist@huntr_aiCVELIST:CVE-2024-3429
HistoryJun 06, 2024 - 6:44 p.m.

CVE-2024-3429 Path Traversal in parisneo/lollms

2024-06-0618:44:55
CWE-29
@huntr_ai
www.cve.org
1
path traversal
parisneo/lollms
security vulnerability
windows
file reading
input sanitization
unauthorized access
information disclosure
denial of service
latest version prior to 9.6

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.0004 Low

EPSS

Percentile

9.2%

A path traversal vulnerability exists in the parisneo/lollms application, specifically within the sanitize_path_from_endpoint and sanitize_path functions in lollms_core\lollms\security.py. This vulnerability allows for arbitrary file reading when the application is running on Windows. The issue arises due to insufficient sanitization of user-supplied input, enabling attackers to bypass the path traversal protection mechanisms by crafting malicious input. Successful exploitation could lead to unauthorized access to sensitive files, information disclosure, and potentially a denial of service (DoS) condition by including numerous large or resource-intensive files. This vulnerability affects the latest version prior to 9.6.

CNA Affected

[
  {
    "vendor": "parisneo",
    "product": "parisneo/lollms",
    "versions": [
      {
        "version": "unspecified",
        "lessThan": "9.6",
        "status": "affected",
        "versionType": "custom"
      }
    ]
  }
]

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.0004 Low

EPSS

Percentile

9.2%

Related for CVELIST:CVE-2024-3429