Lucene search

K

Localai Security Vulnerabilities - November

cve
cve

CVE-2024-2029

A command injection vulnerability exists in the TranscriptEndpoint of mudler/localai, specifically within the audioToWav function used for converting audio files to WAV format for transcription. The vulnerability arises due to the lack of sanitization of user-supplied filenames before passing them ...

9.8CVSS

9.7AI Score

0.0004EPSS

2024-04-10 05:15 PM
57
cve
cve

CVE-2024-5181

A command injection vulnerability exists in the mudler/localai version 2.14.0. The vulnerability arises from the application's handling of the backend parameter in the configuration file, which is used in the name of the initialized process. An attacker can exploit this vulnerability by manipulatin...

9.8CVSS

9.6AI Score

0.0004EPSS

2024-06-26 03:15 AM
27
cve
cve

CVE-2024-5182

A path traversal vulnerability exists in mudler/localai version 2.14.0, where an attacker can exploit the model parameter during the model deletion process to delete arbitrary files. Specifically, by crafting a request with a manipulated model parameter, an attacker can traverse the directory struc...

9.1CVSS

7.5AI Score

0.0005EPSS

2024-06-20 12:15 AM
27
cve
cve

CVE-2024-5616

A Cross-Site Request Forgery (CSRF) vulnerability exists in mudler/LocalAI versions up to and including 2.15.0, which allows attackers to trick victims into deleting installed models. By crafting a malicious HTML page, an attacker can cause the deletion of a model, such as 'gpt-4-vision-preview', w...

4.3CVSS

4.7AI Score

0.0004EPSS

2024-07-06 09:15 AM
28
cve
cve

CVE-2024-6095

A vulnerability in the /models/apply endpoint of mudler/localai versions 2.15.0 allows for Server-Side Request Forgery (SSRF) and partial Local File Inclusion (LFI). The endpoint supports both http(s):// and file:// schemes, where the latter can lead to LFI. However, the output is limited due to th...

5.8CVSS

5.3AI Score

0.002EPSS

2024-07-06 06:15 PM
34
cve
cve

CVE-2024-6983

mudler/localai version 2.17.1 is vulnerable to remote code execution. The vulnerability arises because the localai backend receives inputs not only from the configuration file but also from other inputs, allowing an attacker to upload a binary file and execute malicious code. This can lead to the a...

8.8CVSS

7.8AI Score

0.0004EPSS

2024-09-27 04:15 PM
10