CVE-2024-3435Path Traversal: '\..\filename' in Lollms-webui

Severity
8.4HIGHNVD
EPSS
0.4%
top 36.38%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 16

Description

A path traversal vulnerability exists in the 'save_settings' endpoint of the parisneo/lollms-webui application, affecting versions up to the latest release before 9.5. The vulnerability arises due to insufficient sanitization of the 'config' parameter in the 'apply_settings' function, allowing an attacker to manipulate the application's configuration by sending specially crafted JSON payloads. This could lead to remote code execution (RCE) by bypassing existing patches designed to mitigate such

CVSS vector

CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 2.5 | Impact: 5.9

Affected Packages2 packages

CVEListV5parisneo/parisneo_lollms-webuiunspecified9.5

Patches

🔴Vulnerability Details

1
GHSA
GHSA-4v3g-89jr-8hcp: A path traversal vulnerability exists in the 'save_settings' endpoint of the parisneo/lollms-webui application, affecting versions up to the latest re2024-05-16