CVE-2024-3429Path Traversal: '\..\filename' in Lollms

Severity
9.8CRITICALNVD
EPSS
0.3%
top 46.24%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJun 6

Description

A path traversal vulnerability exists in the parisneo/lollms application, specifically within the `sanitize_path_from_endpoint` and `sanitize_path` functions in `lollms_core\lollms\security.py`. This vulnerability allows for arbitrary file reading when the application is running on Windows. The issue arises due to insufficient sanitization of user-supplied input, enabling attackers to bypass the path traversal protection mechanisms by crafting malicious input. Successful exploitation could lead

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages3 packages

CVEListV5parisneo/parisneo_lollmsunspecified9.6
NVDlollms/lollms< 9.6
PyPIlollms/lollms< 9.5.0

Patches

🔴Vulnerability Details

2
GHSA
LoLLMS Path Traversal vulnerability2024-06-06
OSV
LoLLMS Path Traversal vulnerability2024-06-06