Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS05cDczLXg4NnYtanc1N84AA8mU
path traversal vulnerability was identified in the parisneo/lollms-webui
A path traversal vulnerability was identified in the parisneo/lollms-webui repository, specifically within version 9.6. The vulnerability arises due to improper handling of user-supplied input in the 'list_personalities' endpoint. By crafting a malicious HTTP request, an attacker can traverse the directory structure and view the contents of any folder, albeit limited to subfolder names only. This issue was demonstrated via a specific HTTP request that manipulated the 'category' parameter to access arbitrary directories. The vulnerability is present in the code located at the 'endpoints/lollms_advanced.py' file.
Permalink: https://github.com/advisories/GHSA-9p73-x86v-jw57JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS05cDczLXg4NnYtanc1N84AA8mU
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: 6 months ago
Updated: 6 months ago
CVSS Score: 4.0
CVSS vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Identifiers: GHSA-9p73-x86v-jw57, CVE-2024-4330
References:
- https://nvd.nist.gov/vuln/detail/CVE-2024-4330
- https://github.com/ParisNeo/lollms/commit/0e52d59a06b7f05e3b2611ce7b053fafa44143a9
- https://huntr.com/bounties/154a78d5-3960-4fc6-8666-f982b5e70ed7
- https://github.com/advisories/GHSA-9p73-x86v-jw57
Blast Radius: 2.4
Affected Packages
pypi:lollms
Dependent packages: 0Dependent repositories: 4
Downloads: 16,722 last month
Affected Version Ranges: = 9.6
No known fixed version
All affected versions: