Path Traversal and Denial of Service Vulnerability in Parisneo's Lollms-Webui
CVE-2024-1873

9.1CRITICAL

Key Information:

Vendor
Parisneo
Status
Parisneo/lollms-webui
Vendor
CVE Published:
6 June 2024

Summary

The vulnerability in parisneo's lollms-webui arises from an exposed /select_database endpoint that is susceptible to path traversal attacks. This flaw allows unauthorized users to manipulate file paths, facilitating the creation of directories anywhere on the host system with the application's permissions. Attackers can exploit this weakness to disrupt service by naming directories with critical files' names, such as HTTPS certificates, leading to server startup failures. Furthermore, the vulnerability enables attackers to alter the location of the database files, potentially leading to data loss by scattering client data across the filesystem in uncontrolled locations, complicating recovery efforts.

Affected Version(s)

parisneo/lollms-webui <= unspecified

References

CVSS V3.1

Score:
9.1
Severity:
CRITICAL
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Collectors

NVD DatabaseMitre Database
.