CVE-2024-3126OS Command Injection in Lollms-webui

Severity
8.4HIGHNVD
EPSS
2.0%
top 16.21%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 16

Description

A command injection vulnerability exists in the 'run_xtts_api_server' function of the parisneo/lollms-webui application, specifically within the 'lollms_xtts.py' script. The vulnerability arises due to the improper neutralization of special elements used in an OS command. The affected function utilizes 'subprocess.Popen' to execute a command constructed with a Python f-string, without adequately sanitizing the 'xtts_base_url' input. This flaw allows attackers to execute arbitrary commands remote

CVSS vector

CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 2.5 | Impact: 5.9

Affected Packages2 packages

CVEListV5parisneo/parisneo_lollms-webuiunspecified9.5

Patches

🔴Vulnerability Details

1
GHSA
GHSA-6w8c-vq68-25hc: A command injection vulnerability exists in the 'run_xtts_api_server' function of the parisneo/lollms-webui application, specifically within the 'loll2024-05-16