CVE-2024-2358Path Traversal: '\..\filename' in WEB UI

Severity
9.8CRITICALNVD
EPSS
3.2%
top 13.07%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 16

Description

A path traversal vulnerability in the '/apply_settings' endpoint of parisneo/lollms-webui allows attackers to execute arbitrary code. The vulnerability arises due to insufficient sanitization of user-supplied input in the configuration settings, specifically within the 'extensions' parameter. Attackers can exploit this by crafting a payload that includes relative path traversal sequences ('../../../'), enabling them to navigate to arbitrary directories. This flaw subsequently allows the server t

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages2 packages

CVEListV5parisneo/parisneo_lollms-webuiunspecifiedlatest

Patches

🔴Vulnerability Details

1
GHSA
GHSA-m7qg-v9rw-76m9: A path traversal vulnerability in the '/apply_settings' endpoint of parisneo/lollms-webui allows attackers to execute arbitrary code2024-05-16