Remote Code Execution Vulnerability in parisneo/lollms-webui
CVE-2024-4320

9.8CRITICAL

Key Information:

Vendor
Parisneo
Vendor
CVE Published:
6 June 2024

Summary

A remote code execution vulnerability has been identified in the parisneo/lollms-webui application, specifically within the '/install_extension' endpoint. The flaw is rooted in the mishandling of the 'name' parameter within the ExtensionBuilder() class method build_extension(). This security issue allows attackers to exploit local file inclusion, enabling them to execute arbitrary code. By manipulating the 'name' parameter, a malicious user can compel the server to load and execute a 'init.py' file from an uncontrolled directory, such as the upload directory. This vulnerability particularly poses a risk when the application is accessible through an external connection or is running in headless mode, as it permits remote code execution without any direct user interaction.

Affected Version(s)

parisneo/lollms-webui <= unspecified

References

EPSS Score

23% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.