THREATINT

We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Fathom (Privacy friendly web analytics)
Zendesk (Helpdesk and Chat)

Ok

Home | EN
Support
CVE
PUBLISHED

CVE-2024-1873

Path Traversal and Denial of Service in parisneo/lollms-webui

Assigner@huntr_ai
Reserved2024-02-24
Published2024-06-06
Updated2024-06-07

Description

parisneo/lollms-webui is vulnerable to path traversal and denial of service attacks due to an exposed `/select_database` endpoint in version a9d16b0. The endpoint improperly handles file paths, allowing attackers to specify absolute paths when interacting with the `DiscussionsDB` instance. This flaw enables attackers to create directories anywhere on the system where the application has permissions, potentially leading to denial of service by creating directories with names of critical files, such as HTTPS certificate files, causing server startup failures. Additionally, attackers can manipulate the database path, resulting in the loss of client data by constantly changing the file location to an attacker-controlled location, scattering the data across the filesystem and making recovery difficult.



HIGH: 8.2CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L

Problem types

CWE-749 Exposed Dangerous Method or Function

Product status

Any version
affected

References

https://huntr.com/bounties/c1cfc0d9-517a-4d0e-bf1c-6444c1fd195d

cve.org CVE-2024-1873

nvd.nist.gov CVE-2024-1873

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-1873
© Copyright 2024 THREATINT. Made in Cyprus with +