Arbitrary File Upload and Read Vulnerability in parisneo/lollms-webui
CVE-2024-2361

9.6CRITICAL

Key Information:

Vendor
Parisneo
Status
Parisneo/lollms-webui
Vendor
CVE Published:
16 May 2024

Summary

A vulnerability in Parisneo's Lollms-Webui facilitates arbitrary file uploads and reads due to inadequate sanitization of inputs provided by users. The flaw is located in the install_model() function within lollms_core/lollms/binding.py, which does not properly handle the file:// protocol among other inputs. This allows malicious actors to exploit the vulnerability by manipulating the path and variant_name parameters, thus gaining unauthorized access to read arbitrary files and upload files to any location on the server. The vulnerability poses significant risks as it opens pathways for unauthorized data exposure and system compromise.

Affected Version(s)

parisneo/lollms-webui <= unspecified

References

CVSS V3.1

Score:
9.6
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.