Lucene search

K
osvGoogleOSV:CVE-2024-3322
HistoryJun 06, 2024 - 7:16 p.m.

CVE-2024-3322

2024-06-0619:16:01
Google
osv.dev
1
path traversal vulnerability
cyber security codeguard
parisneo
lollms-webui
version 9.5
process folder function
pathname restriction
arbitrary paths
arbitrary file read
file overwrite
sensitive information disclosure
unauthorized file manipulation

CVSS3

8.4

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

6.4

Confidence

High

EPSS

0

Percentile

10.5%

A path traversal vulnerability exists in the ‘cyber_security/codeguard’ native personality of the parisneo/lollms-webui, affecting versions up to 9.5. The vulnerability arises from the improper limitation of a pathname to a restricted directory in the ‘process_folder’ function within ‘lollms-webui/zoos/personalities_zoo/cyber_security/codeguard/scripts/processor.py’. Specifically, the function fails to properly sanitize user-supplied input for the ‘code_folder_path’, allowing an attacker to specify arbitrary paths using ‘…/’ or absolute paths. This flaw leads to arbitrary file read and overwrite capabilities in specified directories without limitations, posing a significant risk of sensitive information disclosure and unauthorized file manipulation.

CVSS3

8.4

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

6.4

Confidence

High

EPSS

0

Percentile

10.5%

Related for OSV:CVE-2024-3322