ghsa-cm59-8rmv-f2cj
Vulnerability from github
Published
2024-10-29 15:32
Modified
2024-11-04 13:50
Severity ?
6.5 (Medium) - CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L
5.1 (Medium) - CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:L
5.1 (Medium) - CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:L
Summary
Lollms vulnerable to Cross-site Scripting
Details
A vulnerability in the discussion image upload function of the Lollms application, version v9.9, allows for the uploading of SVG files. Due to incomplete filtering in the sanitize_svg function, this can lead to cross-site scripting (XSS) vulnerabilities, which in turn pose a risk of remote code execution. The sanitize_svg function only removes script elements and 'on*' event attributes, but does not account for other potential vectors for XSS within SVG files. This vulnerability can be exploited when authorized users access a malicious URL containing the crafted SVG file.
{ "affected": [ { "package": { "ecosystem": "PyPI", "name": "lollms" }, "ranges": [ { "events": [ { "introduced": "0" }, { "last_affected": "9.5.1" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2024-6581" ], "database_specific": { "cwe_ids": [ "CWE-79" ], "github_reviewed": true, "github_reviewed_at": "2024-11-01T22:03:33Z", "nvd_published_at": "2024-10-29T13:15:07Z", "severity": "MODERATE" }, "details": "A vulnerability in the discussion image upload function of the Lollms application, version v9.9, allows for the uploading of SVG files. Due to incomplete filtering in the sanitize_svg function, this can lead to cross-site scripting (XSS) vulnerabilities, which in turn pose a risk of remote code execution. The sanitize_svg function only removes script elements and \u0027on*\u0027 event attributes, but does not account for other potential vectors for XSS within SVG files. This vulnerability can be exploited when authorized users access a malicious URL containing the crafted SVG file.", "id": "GHSA-cm59-8rmv-f2cj", "modified": "2024-11-04T13:50:54Z", "published": "2024-10-29T15:32:05Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-6581" }, { "type": "WEB", "url": "https://github.com/parisneo/lollms/commit/328b960a0de2097e13654ac752253e9541521ddd" }, { "type": "PACKAGE", "url": "https://github.com/parisneo/lollms" }, { "type": "WEB", "url": "https://github.com/pypa/advisory-database/tree/main/vulns/lollms/PYSEC-2024-116.yaml" }, { "type": "WEB", "url": "https://huntr.com/bounties/ad68ecd6-44e2-449b-8e7e-f2b71b1b43c7" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", "type": "CVSS_V3" }, { "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:L", "type": "CVSS_V4" } ], "summary": "Lollms vulnerable to Cross-site Scripting" }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.