9.1 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
6.6 Medium
AI Score
Confidence
High
0.0004 Low
EPSS
Percentile
9.0%
parisneo/lollms is vulnerable to Local File Inclusion (LFI). The vulnerability is due to insufficient path sanitization in the sanitize_path_from_endpoint
function, which does not properly handle Windows-style paths (backward slash \\
), which allows attackers to exploit directory traversal on Windows systems and resulting in unauthorized reading or deletion of files from the Windows filesystem.
github.com/advisories/GHSA-vqwr-q6cc-c242
github.com/ParisNeo/lollms/blob/d1f6f079423a433768cb6978b7988e60619896bf/lollms/security.py#L117-L132
github.com/ParisNeo/lollms/blob/d1f6f079423a433768cb6978b7988e60619896bf/lollms/security.py#L98-L114
github.com/ParisNeo/lollms/commit/95ad36eeffc6a6be3e3f35ed35a384d768f0ecf6
huntr.com/bounties/8a1b0197-2c36-4276-b92b-630a2a9bb09c
9.1 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
6.6 Medium
AI Score
Confidence
High
0.0004 Low
EPSS
Percentile
9.0%