Path Traversal and Denial of Service Vulnerability in Parisneo's Lollms-Webui
CVE-2024-1873
Key Information:
- Vendor
- Parisneo
- Status
- Parisneo/lollms-webui
- Vendor
- CVE Published:
- 6 June 2024
Summary
The vulnerability in parisneo's lollms-webui arises from an exposed /select_database
endpoint that is susceptible to path traversal attacks. This flaw allows unauthorized users to manipulate file paths, facilitating the creation of directories anywhere on the host system with the application's permissions. Attackers can exploit this weakness to disrupt service by naming directories with critical files' names, such as HTTPS certificates, leading to server startup failures. Furthermore, the vulnerability enables attackers to alter the location of the database files, potentially leading to data loss by scattering client data across the filesystem in uncontrolled locations, complicating recovery efforts.
Affected Version(s)
parisneo/lollms-webui <= unspecified
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved