Lucene search

K
ParisneoLollms Web Ui

10 matches found

CVE
CVE
added 2024/10/11 4:15 p.m.71 views

CVE-2024-6985

A path traversal vulnerability exists in the api open_personality_folder endpoint of parisneo/lollms-webui. This vulnerability allows an attacker to read any folder in the personality_folder on the victim's computer, even though sanitize_path is set. The issue arises due to improper sanitization of...

4.4CVSS4.6AI score0.00041EPSS
CVE
CVE
added 2024/06/22 5:15 p.m.49 views

CVE-2024-5443

CVE-2024-4320 describes a vulnerability in the parisneo/lollms software, specifically within the ExtensionBuilder().build_extension() function. The vulnerability arises from the /mount_extension endpoint, where a path traversal issue allows attackers to navigate beyond the intended directory struct...

9.8CVSS9.7AI score0.59485EPSS
CVE
CVE
added 2024/06/06 7:16 p.m.42 views

CVE-2024-4881

A path traversal vulnerability exists in the parisneo/lollms application, affecting version 9.4.0 and potentially earlier versions, but fixed in version 5.9.0. The vulnerability arises due to improper validation of file paths between Windows and Linux environments, allowing attackers to traverse be...

7.5CVSS7.1AI score0.00132EPSS
CVE
CVE
added 2024/06/27 7:15 p.m.40 views

CVE-2024-6085

A path traversal vulnerability exists in the XTTS server included in the lollms package, version v9.6. This vulnerability arises from the ability to perform an unauthenticated root folder settings change. Although the read file endpoint is protected against path traversals, this protection can be b...

8.6CVSS8.7AI score0.0051EPSS
CVE
CVE
added 2024/10/29 1:15 p.m.39 views

CVE-2024-6581

A vulnerability in the discussion image upload function of the Lollms application, version v9.9, allows for the uploading of SVG files. Due to incomplete filtering in the sanitize_svg function, this can lead to cross-site scripting (XSS) vulnerabilities, which in turn pose a risk of remote code exe...

9CVSS6.7AI score0.00449EPSS
CVE
CVE
added 2024/06/10 8:15 a.m.37 views

CVE-2024-4328

A Cross-Site Request Forgery (CSRF) vulnerability exists in the clear_personality_files_list function of the parisneo/lollms-webui v9.6. The vulnerability arises from the use of a GET request to clear personality files list, which lacks proper CSRF protection. This flaw allows attackers to trick us...

8.1CVSS4.6AI score0.00052EPSS
CVE
CVE
added 2024/07/20 4:15 a.m.37 views

CVE-2024-6281

A path traversal vulnerability exists in the apply_settings function of parisneo/lollms versions prior to 9.5.1. The sanitize_path function does not adequately secure the discussion_db_name parameter, allowing attackers to manipulate the path and potentially write to important system folders.

7.3CVSS7.2AI score0.00027EPSS
CVE
CVE
added 2024/10/11 1:15 p.m.37 views

CVE-2024-6971

A path traversal vulnerability exists in the parisneo/lollms-webui repository, specifically in the lollms_file_system.py file. The functions add_rag_database, toggle_mount_rag_database, and vectorize_folder do not implement security measures such as sanitize_path_from_endpoint or sanitize_path. Thi...

4.4CVSS3.8AI score0.00026EPSS
CVE
CVE
added 2024/06/24 12:15 a.m.36 views

CVE-2024-3121

A remote code execution vulnerability exists in the create_conda_env function of the parisneo/lollms repository, version 5.9.0. The vulnerability arises from the use of shell=True in the subprocess.Popen function, which allows an attacker to inject arbitrary commands by manipulating the env_name an...

6.8CVSS5.2AI score0.0007EPSS
CVE
CVE
added 2024/06/12 1:15 a.m.27 views

CVE-2024-4315

parisneo/lollms version 9.5 is vulnerable to Local File Inclusion (LFI) attacks due to insufficient path sanitization. The sanitize_path_from_endpoint function fails to properly sanitize Windows-style paths (backward slash \), allowing attackers to perform directory traversal attacks on Windows sys...

9.1CVSS9.1AI score0.00599EPSS