Remote Code Execution in Parisneo Lollms Web UI
CVE-2024-9920
8.8HIGH
Summary
The Lollms Web UI in version 12 enables an insecure file upload functionality that permits the uploading of various file types, including executable scripts such as .py, .sh, and .bat. This can lead to severe security risks as attackers could upload malicious files and execute them through the '/open_file' API endpoint. The root of the issue stems from the failure to properly validate the files being uploaded, resulting in potential remote code execution via subprocess commands. This vulnerability puts users and systems at significant risk if not addressed.
Affected Version(s)
parisneo/lollms-webui <= unspecified
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
CVSS V3.0
Score:
6.6
Severity:
MEDIUM
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Physical
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved