Path Traversal Vulnerability in Parisneo's Lollms-Webui Affects Remote Code Execution
CVE-2024-2360
9.8CRITICAL
Key Information:
- Vendor
- Parisneo
- Status
- Parisneo/lollms-webui
- Vendor
- CVE Published:
- 6 June 2024
Summary
The vulnerability in parisneo's Lollms WebUI arises from inadequate validation of user-supplied inputs related to the 'Database path' and 'PDF LaTeX path'. An attacker can manipulate these parameters to launch path traversal attacks, leading to the execution of arbitrary code on the targeted server. This flaw exploits the application's handling of 'discussion_db_name' and 'pdf_latex_path', where improper sanitization allows access to restricted directories. Consequently, this vulnerability not only facilitates remote code execution but also exposes additional files, potentially opening up further attack vectors.
Affected Version(s)
parisneo/lollms-webui <= unspecified
References
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Collectors
NVD DatabaseMitre Database