cve-2024-4328
Vulnerability from cvelistv5
Published
2024-06-10 07:27
Modified
2024-08-01 20:40
Severity ?
EPSS score ?
Summary
CSRF in clear_personality_files_list in parisneo/lollms-webui
References
Impacted products
▼ | Vendor | Product |
---|---|---|
parisneo | parisneo/lollms-webui |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:parisneo:lollms-webui:9.6:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "lollms-webui", "vendor": "parisneo", "versions": [ { "status": "affected", "version": "9.6" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-4328", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-06-10T12:17:31.087611Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-10T12:18:56.901Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T20:40:47.115Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://huntr.com/bounties/0f4faadf-ebca-4ef8-9d8a-66dbd849c0f8" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "parisneo/lollms-webui", "vendor": "parisneo", "versions": [ { "lessThanOrEqual": "latest", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "A Cross-Site Request Forgery (CSRF) vulnerability exists in the clear_personality_files_list function of the parisneo/lollms-webui v9.6. The vulnerability arises from the use of a GET request to clear personality files list, which lacks proper CSRF protection. This flaw allows attackers to trick users into performing actions without their consent, such as deleting important files on the system. The issue is present in the application\u0027s handling of requests, making it susceptible to CSRF attacks that could lead to unauthorized actions being performed on behalf of the user." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-352", "description": "CWE-352 Cross-Site Request Forgery (CSRF)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-10T07:27:09.072Z", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntr_ai" }, "references": [ { "url": "https://huntr.com/bounties/0f4faadf-ebca-4ef8-9d8a-66dbd849c0f8" } ], "source": { "advisory": "0f4faadf-ebca-4ef8-9d8a-66dbd849c0f8", "discovery": "EXTERNAL" }, "title": "CSRF in clear_personality_files_list in parisneo/lollms-webui" } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntr_ai", "cveId": "CVE-2024-4328", "datePublished": "2024-06-10T07:27:09.072Z", "dateReserved": "2024-04-29T20:00:20.042Z", "dateUpdated": "2024-08-01T20:40:47.115Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2024-4328\",\"sourceIdentifier\":\"security@huntr.dev\",\"published\":\"2024-06-10T08:15:51.730\",\"lastModified\":\"2024-06-12T19:33:00.527\",\"vulnStatus\":\"Analyzed\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"A Cross-Site Request Forgery (CSRF) vulnerability exists in the clear_personality_files_list function of the parisneo/lollms-webui v9.6. The vulnerability arises from the use of a GET request to clear personality files list, which lacks proper CSRF protection. This flaw allows attackers to trick users into performing actions without their consent, such as deleting important files on the system. The issue is present in the application\u0027s handling of requests, making it susceptible to CSRF attacks that could lead to unauthorized actions being performed on behalf of the user.\"},{\"lang\":\"es\",\"value\":\"Existe una vulnerabilidad de Cross-Site Request Forgery (CSRF) en la funci\u00f3n clear_personality_files_list de parisneo/lollms-webui v9.6. La vulnerabilidad surge del uso de una solicitud GET para borrar la lista de archivos de personalidad, que carece de la protecci\u00f3n CSRF adecuada. Esta falla permite a los atacantes enga\u00f1ar a los usuarios para que realicen acciones sin su consentimiento, como eliminar archivos importantes del sistema. El problema est\u00e1 presente en el manejo de solicitudes por parte de la aplicaci\u00f3n, lo que la hace susceptible a ataques CSRF que podr\u00edan llevar a la realizaci\u00f3n de acciones no autorizadas en nombre del usuario.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\",\"baseScore\":8.1,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.2}],\"cvssMetricV30\":[{\"source\":\"security@huntr.dev\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"LOW\",\"baseScore\":4.0,\"baseSeverity\":\"MEDIUM\"},\"exploitabilityScore\":2.5,\"impactScore\":1.4}]},\"weaknesses\":[{\"source\":\"security@huntr.dev\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-352\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:parisneo:lollms_web_ui:9.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"525C477F-F133-44B9-A0BC-43C1080D35F1\"}]}]}],\"references\":[{\"url\":\"https://huntr.com/bounties/0f4faadf-ebca-4ef8-9d8a-66dbd849c0f8\",\"source\":\"security@huntr.dev\",\"tags\":[\"Exploit\"]}]}}" } }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.