Path Traversal Vulnerability in Parisneo's Lollms-Webui Affects Remote Code Execution
CVE-2024-2360

9.8CRITICAL

Key Information:

Vendor
Parisneo
Status
Parisneo/lollms-webui
Vendor
CVE Published:
6 June 2024

Summary

The vulnerability in parisneo's Lollms WebUI arises from inadequate validation of user-supplied inputs related to the 'Database path' and 'PDF LaTeX path'. An attacker can manipulate these parameters to launch path traversal attacks, leading to the execution of arbitrary code on the targeted server. This flaw exploits the application's handling of 'discussion_db_name' and 'pdf_latex_path', where improper sanitization allows access to restricted directories. Consequently, this vulnerability not only facilitates remote code execution but also exposes additional files, potentially opening up further attack vectors.

Affected Version(s)

parisneo/lollms-webui <= unspecified

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Collectors

NVD DatabaseMitre Database
.