Arbitrary File Upload and Read Vulnerability in parisneo/lollms-webui
CVE-2024-2361
9.6CRITICAL
Key Information:
- Vendor
- Parisneo
- Status
- Parisneo/lollms-webui
- Vendor
- CVE Published:
- 16 May 2024
Summary
A vulnerability in Parisneo's Lollms-Webui facilitates arbitrary file uploads and reads due to inadequate sanitization of inputs provided by users. The flaw is located in the install_model()
function within lollms_core/lollms/binding.py
, which does not properly handle the file://
protocol among other inputs. This allows malicious actors to exploit the vulnerability by manipulating the path
and variant_name
parameters, thus gaining unauthorized access to read arbitrary files and upload files to any location on the server. The vulnerability poses significant risks as it opens pathways for unauthorized data exposure and system compromise.
Affected Version(s)
parisneo/lollms-webui <= unspecified
References
CVSS V3.1
Score:
9.6
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved