Lucene search

K
vulnrichment@huntr_aiVULNRICHMENT:CVE-2024-3435
HistoryMay 16, 2024 - 9:03 a.m.

CVE-2024-3435 Path Traversal in parisneo/lollms-webui

2024-05-1609:03:48
CWE-29
@huntr_ai
github.com
6
cve-2024-3435; path traversal; remote code execution; input sanitization; parisneo/lollms-webui; application security; json payloads; rce

CVSS3

8.4

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

7.7

Confidence

Low

EPSS

0

Percentile

9.0%

SSVC

Exploitation

poc

Automatable

no

Technical Impact

total

A path traversal vulnerability exists in the ‘save_settings’ endpoint of the parisneo/lollms-webui application, affecting versions up to the latest release before 9.5. The vulnerability arises due to insufficient sanitization of the ‘config’ parameter in the ‘apply_settings’ function, allowing an attacker to manipulate the application’s configuration by sending specially crafted JSON payloads. This could lead to remote code execution (RCE) by bypassing existing patches designed to mitigate such vulnerabilities.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:parisneo:lollms-webui:*:*:*:*:*:*:*:*"
    ],
    "vendor": "parisneo",
    "product": "lollms-webui",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "lessThan": "9.5",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

8.4

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

7.7

Confidence

Low

EPSS

0

Percentile

9.0%

SSVC

Exploitation

poc

Automatable

no

Technical Impact

total

Related for VULNRICHMENT:CVE-2024-3435