Lucene search

K
githubGitHub Advisory DatabaseGHSA-79H8-GXHQ-Q3JG
HistoryJun 24, 2024 - 12:34 a.m.

Remote Code Execution in create_conda_env function in lollms

2024-06-2400:34:02
CWE-94
GitHub Advisory Database
github.com
3
remote code execution
create_conda_env
parisneo/lollms
vulnerability
subprocess.popen
security breach
'whoami' command
software

6.8 Medium

CVSS3

Attack Vector

PHYSICAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

8.2 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

A remote code execution vulnerability exists in the create_conda_env function of the parisneo/lollms repository. The vulnerability arises from the use of shell=True in the subprocess.Popen function, which allows an attacker to inject arbitrary commands by manipulating the env_name and python_version parameters. This issue could lead to a serious security breach as demonstrated by the ability to execute the ‘whoami’ command among potentially other harmful commands.

Affected configurations

Vulners
Node
parisneolollms_web_uiRange9.5.1
CPENameOperatorVersion
lollmsle9.5.1

6.8 Medium

CVSS3

Attack Vector

PHYSICAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

8.2 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

Related for GHSA-79H8-GXHQ-Q3JG