CVE-2024-4078Command Injection in Lollms

CWE-77Command Injection3 documents3 sources
Severity
9.8CRITICALNVD
EPSS
9.8%
top 7.03%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMay 16

Description

A vulnerability in the parisneo/lollms, specifically in the `/unInstall_binding` endpoint, allows for arbitrary code execution due to insufficient sanitization of user input. The issue arises from the lack of path sanitization when handling the `name` parameter in the `unInstall_binding` function, allowing an attacker to traverse directories and execute arbitrary code by loading a malicious `__init__.py` file. This vulnerability affects the latest version of the software. The exploitation of thi

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages2 packages

CVEListV5parisneo/parisneo_lollmsunspecifiedmain
PyPIlollms/lollms< 9.5.0

🔴Vulnerability Details

2
OSV
LoLLMS Command Injection vulnerability2024-05-16
GHSA
LoLLMS Command Injection vulnerability2024-05-16