THREATINT

We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Fathom (Privacy friendly web analytics)
Zendesk (Helpdesk and Chat)

Ok

Home | EN
Support
CVE
PUBLISHED

CVE-2024-3435

Path Traversal in parisneo/lollms-webui

Assigner@huntr_ai
Reserved2024-04-07
Published2024-05-16
Updated2024-06-04

Description

A path traversal vulnerability exists in the 'save_settings' endpoint of the parisneo/lollms-webui application, affecting versions up to the latest release before 9.5. The vulnerability arises due to insufficient sanitization of the 'config' parameter in the 'apply_settings' function, allowing an attacker to manipulate the application's configuration by sending specially crafted JSON payloads. This could lead to remote code execution (RCE) by bypassing existing patches designed to mitigate such vulnerabilities.



HIGH: 8.4CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-29 Path Traversal: '\..\filename'

Product status

Any version before 9.5
affected

References

https://huntr.com/bounties/494f349a-8650-4d30-a0bd-4742fda44ce5

https://github.com/parisneo/lollms-webui/commit/bb99b59e710d00c4f2598faa5e183fa30fbd3bc2

cve.org CVE-2024-3435

nvd.nist.gov CVE-2024-3435

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-3435
© Copyright 2024 THREATINT. Made in Cyprus with +