CVE-2024-6394Path Traversal: '\..\filename' in Lollms-webui

Severity
7.5HIGHNVD
EPSS
0.5%
top 33.41%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 30

Description

A Local File Inclusion vulnerability exists in parisneo/lollms-webui versions below v9.8. The vulnerability is due to unverified path concatenation in the `serve_js` function in `app.py`, which allows attackers to perform path traversal attacks. This can lead to unauthorized access to arbitrary files on the server, potentially exposing sensitive information such as private SSH keys, configuration files, and source code.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:NExploitability: 3.9 | Impact: 3.6

Affected Packages2 packages

CVEListV5parisneo/parisneo_lollms-webuiunspecifiedlatest

🔴Vulnerability Details

1
GHSA
GHSA-g8rf-47g8-m3m9: A Local File Inclusion vulnerability exists in parisneo/lollms-webui versions below v92024-09-30