Lucene search

K
osvGoogleOSV:GHSA-79H8-GXHQ-Q3JG
HistoryJun 24, 2024 - 12:34 a.m.

Remote Code Execution in create_conda_env function in lollms

2024-06-2400:34:02
Google
osv.dev
4
remote code execution
create_conda_env
lollms
vulnerability
shell=true
subprocess.popen
security breach
whoami command

CVSS3

3.3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

AI Score

8.2

Confidence

High

EPSS

0

Percentile

16.6%

A remote code execution vulnerability exists in the create_conda_env function of the parisneo/lollms repository. The vulnerability arises from the use of shell=True in the subprocess.Popen function, which allows an attacker to inject arbitrary commands by manipulating the env_name and python_version parameters. This issue could lead to a serious security breach as demonstrated by the ability to execute the ‘whoami’ command among potentially other harmful commands.

CVSS3

3.3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

AI Score

8.2

Confidence

High

EPSS

0

Percentile

16.6%

Related for OSV:GHSA-79H8-GXHQ-Q3JG