THREATINT

We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Fathom (Privacy friendly web analytics)
Zendesk (Helpdesk and Chat)

Ok

Home | EN
Support
CVE
PUBLISHED

CVE-2024-3429

Path Traversal in parisneo/lollms

Assigner@huntr_ai
Reserved2024-04-06
Published2024-06-06
Updated2024-06-10

Description

A path traversal vulnerability exists in the parisneo/lollms application, specifically within the `sanitize_path_from_endpoint` and `sanitize_path` functions in `lollms_core\lollms\security.py`. This vulnerability allows for arbitrary file reading when the application is running on Windows. The issue arises due to insufficient sanitization of user-supplied input, enabling attackers to bypass the path traversal protection mechanisms by crafting malicious input. Successful exploitation could lead to unauthorized access to sensitive files, information disclosure, and potentially a denial of service (DoS) condition by including numerous large or resource-intensive files. This vulnerability affects the latest version prior to 9.6.



CRITICAL: 9.8CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-29 Path Traversal: '\..\filename'

Product status

Any version before 9.6
affected

References

https://huntr.com/bounties/fd8f50c8-17f0-40be-a2c6-bb8d80f7c409

https://github.com/parisneo/lollms/commit/f4424cfc3d6dfb3ad5ac17dd46801efe784933e9

cve.org CVE-2024-3429

nvd.nist.gov CVE-2024-3429

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-3429
© Copyright 2024 THREATINT. Made in Cyprus with +