Path Traversal in parisneo/lollms
CVE-2024-5824
7.4HIGH
Summary
A path traversal vulnerability exists in the /set_personality_config
endpoint of the Parisneo Lollms application, specifically in version 9.4.0. This vulnerability allows an attacker to exploit improper handling of file paths to overwrite the configs/config.yaml
file. By manipulating this configuration file, an attacker can change critical server properties such as force_accept_remote_access
and turn_on_code_validation
, ultimately leading to the execution of arbitrary code on the server. This poses significant risks to the security integrity of affected systems.
Affected Version(s)
parisneo/lollms < unspecified
References
CVSS V3.1
Score:
7.4
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published