CVE-2024-2624Path Traversal: '\..\filename' in Lollms-webui

Severity
9.8CRITICALNVD
EPSS
10.3%
top 6.79%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 6

Description

A path traversal and arbitrary file upload vulnerability exists in the parisneo/lollms-webui application, specifically within the `@router.get("/switch_personal_path")` endpoint in `./lollms-webui/lollms_core/lollms/server/endpoints/lollms_user.py`. The vulnerability arises due to insufficient sanitization of user-supplied input for the `path` parameter, allowing an attacker to specify arbitrary file system paths. This flaw enables direct arbitrary file uploads, leakage of `personal_data`, and o

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages2 packages

CVEListV5parisneo/parisneo_lollms-webuiunspecified9.4

Patches

🔴Vulnerability Details

1
GHSA
GHSA-5p62-ppjr-4c45: A path traversal and arbitrary file upload vulnerability exists in the parisneo/lollms-webui application, specifically within the `@router2024-06-06