Path Traversal Vulnerability in Lollms-Webui Could Lead to Remote Code Execution
CVE-2024-3435
8.4HIGH
Key Information:
- Vendor
- Parisneo
- Status
- Parisneo/lollms-webui
- Vendor
- CVE Published:
- 16 May 2024
Summary
A vulnerability exists in the 'save_settings' endpoint of the Lollms-WebUI application due to insufficient sanitization of the 'config' parameter in the 'apply_settings' function. This flaw enables an attacker to exploit the application by sending specially crafted JSON payloads, allowing unauthorized manipulation of application configurations. The vulnerability could be exploited to execute remote code, potentially bypassing security patches designed to protect against such attacks.
Affected Version(s)
parisneo/lollms-webui < 9.5
References
CVSS V3.1
Score:
8.4
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved