CVE-2024-6985Relative Path Traversal in Lollms

Severity
4.4MEDIUMNVD
EPSS
0.1%
top 83.41%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedOct 11

Description

A path traversal vulnerability exists in the api open_personality_folder endpoint of parisneo/lollms-webui. This vulnerability allows an attacker to read any folder in the personality_folder on the victim's computer, even though sanitize_path is set. The issue arises due to improper sanitization of the personality_folder parameter, which can be exploited to traverse directories and access arbitrary files.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:NExploitability: 0.8 | Impact: 3.6

Affected Packages3 packages

CVEListV5parisneo/parisneo_lollmsunspecified5.9.0
NVDlollms/lollms< 5.9.0
PyPIlollms/lollms< 28ee567a9a120967215ff19b96ab7515ce469620+2

Patches

🔴Vulnerability Details

3
OSV
CVE-2024-6985: A path traversal vulnerability exists in the api open_personality_folder endpoint of parisneo/lollms-webui2024-10-11
GHSA
Lord of Large Language Models (LoLLMs) path traversal vulnerability in the api open_personality_folder endpoint2024-10-11
OSV
Lord of Large Language Models (LoLLMs) path traversal vulnerability in the api open_personality_folder endpoint2024-10-11