ghsa-9p73-x86v-jw57
Vulnerability from github
Published
2024-06-02 22:30
Modified
2024-06-02 22:30
Severity ?
Summary
path traversal vulnerability was identified in the parisneo/lollms-webui
Details
A path traversal vulnerability was identified in the parisneo/lollms-webui repository, specifically within version 9.6. The vulnerability arises due to improper handling of user-supplied input in the 'list_personalities' endpoint. By crafting a malicious HTTP request, an attacker can traverse the directory structure and view the contents of any folder, albeit limited to subfolder names only. This issue was demonstrated via a specific HTTP request that manipulated the 'category' parameter to access arbitrary directories. The vulnerability is present in the code located at the 'endpoints/lollms_advanced.py' file.
{ "affected": [ { "package": { "ecosystem": "PyPI", "name": "lollms" }, "versions": [ "9.6" ] } ], "aliases": [ "CVE-2024-4330" ], "database_specific": { "cwe_ids": [ "CWE-23" ], "github_reviewed": true, "github_reviewed_at": "2024-06-02T22:30:25Z", "nvd_published_at": "2024-05-30T15:15:49Z", "severity": "MODERATE" }, "details": "A path traversal vulnerability was identified in the parisneo/lollms-webui repository, specifically within version 9.6. The vulnerability arises due to improper handling of user-supplied input in the \u0027list_personalities\u0027 endpoint. By crafting a malicious HTTP request, an attacker can traverse the directory structure and view the contents of any folder, albeit limited to subfolder names only. This issue was demonstrated via a specific HTTP request that manipulated the \u0027category\u0027 parameter to access arbitrary directories. The vulnerability is present in the code located at the \u0027endpoints/lollms_advanced.py\u0027 file.", "id": "GHSA-9p73-x86v-jw57", "modified": "2024-06-02T22:30:25Z", "published": "2024-06-02T22:30:25Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-4330" }, { "type": "WEB", "url": "https://github.com/ParisNeo/lollms/commit/0e52d59a06b7f05e3b2611ce7b053fafa44143a9" }, { "type": "PACKAGE", "url": "https://github.com/ParisNeo/lollms" }, { "type": "WEB", "url": "https://huntr.com/bounties/154a78d5-3960-4fc6-8666-f982b5e70ed7" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "type": "CVSS_V3" } ], "summary": "path traversal vulnerability was identified in the parisneo/lollms-webui " }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.