Lucene search

K
vulnrichment@huntr_aiVULNRICHMENT:CVE-2024-2548
HistoryJun 06, 2024 - 6:08 p.m.

CVE-2024-2548 Path Traversal in parisneo/lollms-webui

2024-06-0618:08:15
CWE-36
@huntr_ai
github.com
5
cve-2024-2548
path traversal
parisneo/lollms-webui
validation
windows platform
endpoint
file reading
version 9.5
security issue

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

AI Score

6.8

Confidence

High

EPSS

0

Percentile

9.0%

SSVC

Exploitation

poc

Automatable

yes

Technical Impact

total

A path traversal vulnerability exists in the parisneo/lollms-webui application, specifically within the lollms_core/lollms/server/endpoints/lollms_binding_files_server.py and lollms_core/lollms/security.py files. Due to inadequate validation of file paths between Windows and Linux environments using Path(path).is_absolute(), attackers can exploit this flaw to read any file on the system. This issue affects the latest version of LoLLMs running on the Windows platform. The vulnerability is triggered when an attacker sends a specially crafted request to the /user_infos/{path:path} endpoint, allowing the reading of arbitrary files, as demonstrated with the win.ini file. The issue has been addressed in version 9.5 of the software.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:parisneo:parisneo\\/lollms-webui:*:*:*:*:*:*:*:*"
    ],
    "vendor": "parisneo",
    "product": "parisneo\\/lollms-webui",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "lessThan": "9.5",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

AI Score

6.8

Confidence

High

EPSS

0

Percentile

9.0%

SSVC

Exploitation

poc

Automatable

yes

Technical Impact

total

Related for VULNRICHMENT:CVE-2024-2548