CVE-2024-1646Authentication Bypass Using an Alternate Path or Channel in Lollms-webui

Severity
8.2HIGHNVD
EPSS
0.1%
top 79.31%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 16
Latest updateNov 21

Description

parisneo/lollms-webui is vulnerable to authentication bypass due to insufficient protection over sensitive endpoints. The application checks if the host parameter is not '0.0.0.0' to restrict access, which is inadequate when the application is bound to a specific interface, allowing unauthorized access to endpoints such as '/restart_program', '/update_software', '/check_update', '/start_recording', and '/stop_recording'. This vulnerability can lead to denial of service, unauthorized disabling or

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:HExploitability: 3.9 | Impact: 4.2

Affected Packages2 packages

CVEListV5parisneo/parisneo_lollms-webuiunspecified9.3

Patches

🔴Vulnerability Details

1
GHSA
GHSA-5wh4-2859-9f36: parisneo/lollms-webui is vulnerable to authentication bypass due to insufficient protection over sensitive endpoints2024-04-16

📋Vendor Advisories

1
Red Hat
kernel: afs: Fix lock recursion2024-11-21