Lucene search

K
vulnrichment@huntr_aiVULNRICHMENT:CVE-2024-5182
HistoryJun 19, 2024 - 11:30 p.m.

CVE-2024-5182 Path Traversal in mudler/localai

2024-06-1923:30:38
CWE-22
@huntr_ai
github.com
4
cve-2024-5182
path traversal
mudler/localai
version 2.14.0
model parameter
input validation
directory structure

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

6.8

Confidence

High

EPSS

0.001

Percentile

18.7%

SSVC

Exploitation

poc

Automatable

yes

Technical Impact

partial

A path traversal vulnerability exists in mudler/localai version 2.14.0, where an attacker can exploit the model parameter during the model deletion process to delete arbitrary files. Specifically, by crafting a request with a manipulated model parameter, an attacker can traverse the directory structure and target files outside of the intended directory, leading to the deletion of sensitive data. This vulnerability is due to insufficient input validation and sanitization of the model parameter.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:mudler:localai:0:*:*:*:*:*:*:*"
    ],
    "vendor": "mudler",
    "product": "localai",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "lessThan": "2.16.0",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

6.8

Confidence

High

EPSS

0.001

Percentile

18.7%

SSVC

Exploitation

poc

Automatable

yes

Technical Impact

partial

Related for VULNRICHMENT:CVE-2024-5182