CVE-2024-4315Path Traversal in Lollms

Severity
9.1CRITICALNVD
EPSS
0.9%
top 24.32%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJun 12

Description

parisneo/lollms version 9.5 is vulnerable to Local File Inclusion (LFI) attacks due to insufficient path sanitization. The `sanitize_path_from_endpoint` function fails to properly sanitize Windows-style paths (backward slash `\`), allowing attackers to perform directory traversal attacks on Windows systems. This vulnerability can be exploited through various routes, including `personalities` and `/del_preset`, to read or delete any file on the Windows filesystem, compromising the system's availa

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:HExploitability: 3.9 | Impact: 5.2

Affected Packages2 packages

CVEListV5parisneo/parisneo_lollmsunspecified9.8
PyPIlollms/lollms< 9.5.0

🔴Vulnerability Details

2
GHSA
parisneo/lollms Local File Inclusion (LFI) attack2024-06-12
OSV
parisneo/lollms Local File Inclusion (LFI) attack2024-06-12

📐Framework References

2
CWE
Incomplete List of Disallowed Inputs
CWE
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')