Vulnerability in lollms-webui Allows Path Traversal and Code Execution
CVE-2024-6971
3.4LOW
Summary
A path traversal vulnerability exists in the parisneo/lollms-webui repository, specifically in the lollms_file_system.py
file. The functions add_rag_database
, toggle_mount_rag_database
, and vectorize_folder
do not implement security measures such as sanitize_path_from_endpoint
or sanitize_path
. This allows an attacker to perform vectorize operations on .sqlite
files in any directory on the victim's computer, potentially installing multiple packages and causing a crash.
Affected Version(s)
parisneo/lollms <= unspecified
References
CVSS V3.1
Score:
3.4
Severity:
LOW
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved