Vulnerability in lollms-webui Allows Path Traversal and Code Execution
CVE-2024-6971

3.4LOW

Key Information:

Vendor
Parisneo
Vendor
CVE Published:
11 October 2024

Summary

A path traversal vulnerability exists in the parisneo/lollms-webui repository, specifically in the lollms_file_system.py file. The functions add_rag_database, toggle_mount_rag_database, and vectorize_folder do not implement security measures such as sanitize_path_from_endpoint or sanitize_path. This allows an attacker to perform vectorize operations on .sqlite files in any directory on the victim's computer, potentially installing multiple packages and causing a crash.

Affected Version(s)

parisneo/lollms <= unspecified

References

CVSS V3.1

Score:
3.4
Severity:
LOW
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2024-6971 : Vulnerability in lollms-webui Allows Path Traversal and Code Execution | SecurityVulnerability.io