CVE-2024-2624 — Path Traversal: '\..\filename' in Lollms-webui
Severity
9.8CRITICALNVD
EPSS
10.3%
top 6.79%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJun 6
Description
A path traversal and arbitrary file upload vulnerability exists in the parisneo/lollms-webui application, specifically within the `@router.get("/switch_personal_path")` endpoint in `./lollms-webui/lollms_core/lollms/server/endpoints/lollms_user.py`. The vulnerability arises due to insufficient sanitization of user-supplied input for the `path` parameter, allowing an attacker to specify arbitrary file system paths. This flaw enables direct arbitrary file uploads, leakage of `personal_data`, and o…
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9
Affected Packages2 packages
Patches
🔴Vulnerability Details
1GHSA▶
GHSA-5p62-ppjr-4c45: A path traversal and arbitrary file upload vulnerability exists in the parisneo/lollms-webui application, specifically within the `@router↗2024-06-06