CVE-2024-2178Path Traversal: '\..\filename' in WEB UI

Severity
7.5HIGHNVD
EPSS
0.2%
top 56.93%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 2

Description

A path traversal vulnerability exists in the parisneo/lollms-webui, specifically within the 'copy_to_custom_personas' endpoint in the 'lollms_personalities_infos.py' file. This vulnerability allows attackers to read arbitrary files by manipulating the 'category' and 'name' parameters during the 'Copy to custom personas folder for editing' process. By inserting '../' sequences in these parameters, attackers can traverse the directory structure and access files outside of the intended directory. S

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:NExploitability: 3.9 | Impact: 3.6

Affected Packages2 packages

CVEListV5parisneo/parisneo_lollms-webuiunspecifiedlatest

Patches

🔴Vulnerability Details

1
GHSA
GHSA-3w8h-vhc9-93cj: A path traversal vulnerability exists in the parisneo/lollms-webui, specifically within the 'copy_to_custom_personas' endpoint in the 'lollms_personal2024-06-02