Lucene search

K
githubGitHub Advisory DatabaseGHSA-M45C-V46H-C788
HistoryJun 27, 2024 - 9:32 p.m.

lollms path traversal vulnerability allows overriding of config.yaml file, leading to RCE

2024-06-2721:32:08
CWE-22
GitHub Advisory Database
github.com
2
path traversal vulnerability
remote code execution
server configuration

7.4 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

7.7 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

10.6%

A path traversal vulnerability in the /set_personality_config endpoint of parisneo/lollms version 9.4.0 allows an attacker to overwrite the configs/config.yaml file. This can lead to remote code execution by changing server configuration properties such as force_accept_remote_access and turn_on_code_validation.

Affected configurations

Vulners
Node
parisneolollms_web_uiRange<9.5.0
CPENameOperatorVersion
lollmslt9.5.0

7.4 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

7.7 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

10.6%

Related for GHSA-M45C-V46H-C788