THREATINT

We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Fathom (Privacy friendly web analytics)
Zendesk (Helpdesk and Chat)

Ok

Home | EN
Support
CVE
PUBLISHED

CVE-2024-5482

SSRF in add_webpage endpoint in parisneo/lollms-webui

Assigner@huntr_ai
Reserved2024-05-29
Published2024-06-06
Updated2024-06-07

Description

A Server-Side Request Forgery (SSRF) vulnerability exists in the 'add_webpage' endpoint of the parisneo/lollms-webui application, affecting the latest version. The vulnerability arises because the application does not adequately validate URLs entered by users, allowing them to input arbitrary URLs, including those that target internal resources such as 'localhost' or '127.0.0.1'. This flaw enables attackers to make unauthorized requests to internal or external systems, potentially leading to access to sensitive data, service disruption, network integrity compromise, business logic manipulation, and abuse of third-party resources. The issue is critical and requires immediate attention to maintain the application's security and integrity.



HIGH: 7.4CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N

Problem types

CWE-918 Server-Side Request Forgery (SSRF)

Product status

Any version
affected

References

https://huntr.com/bounties/d97e23e7-172f-4862-a732-86bfc0b7860e

cve.org CVE-2024-5482

nvd.nist.gov CVE-2024-5482

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-5482
© Copyright 2024 THREATINT. Made in Cyprus with +