Assigner | @huntr_ai |
Reserved | 2024-04-29 |
Published | 2024-05-30 |
Updated | 2024-06-07 |
Description
A path traversal vulnerability was identified in the parisneo/lollms-webui repository, specifically within version 9.6. The vulnerability arises due to improper handling of user-supplied input in the 'list_personalities' endpoint. By crafting a malicious HTTP request, an attacker can traverse the directory structure and view the contents of any folder, albeit limited to subfolder names only. This issue was demonstrated via a specific HTTP request that manipulated the 'category' parameter to access arbitrary directories. The vulnerability is present in the code located at the 'endpoints/lollms_advanced.py' file.
CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N |
Problem types
CWE-23 Relative Path Traversal
Product status
References
https://huntr.com/bounties/154a78d5-3960-4fc6-8666-f982b5e70ed7