Skip to content

path traversal vulnerability was identified in the parisneo/lollms-webui

Moderate severity GitHub Reviewed Published Jun 2, 2024 to the GitHub Advisory Database • Updated Jun 2, 2024

Package

pip lollms (pip)

Affected versions

= 9.6

Patched versions

None

Description

A path traversal vulnerability was identified in the parisneo/lollms-webui repository, specifically within version 9.6. The vulnerability arises due to improper handling of user-supplied input in the 'list_personalities' endpoint. By crafting a malicious HTTP request, an attacker can traverse the directory structure and view the contents of any folder, albeit limited to subfolder names only. This issue was demonstrated via a specific HTTP request that manipulated the 'category' parameter to access arbitrary directories. The vulnerability is present in the code located at the 'endpoints/lollms_advanced.py' file.

References

Published by the National Vulnerability Database May 30, 2024
Published to the GitHub Advisory Database Jun 2, 2024
Reviewed Jun 2, 2024
Last updated Jun 2, 2024

Severity

Moderate
4.0
/ 10

CVSS base metrics

Attack vector
Local
Attack complexity
Low
Privileges required
None
User interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
None
CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Weaknesses

CVE ID

CVE-2024-4330

GHSA ID

GHSA-9p73-x86v-jw57

Source code

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.