In version 0.3.8 of open-webui/open-webui, an arbitrary file write vulnerability exists in the download_model endpoint. When deployed on Windows, the application improperly handles file paths, allowing an attacker to manipulate the file path to write files to arbitrary locations on the server's filesystem. This can result in overwriting critical system or application files, causing denial of service, or potentially achieving remote code execution (RCE). RCE can allow an attacker to execute malicious code with the privileges of the user running the application, leading to a full system compromise.
References:GSA_kwCzR0hTQS0zcDlxLTd3NjMtM2Y4cc4ABFuB
Open WebUI Allows Arbitrary File Write via the `download_model` Endpoint
Affected Packages | Affected Versions | Fixed Versions | |
---|---|---|---|
pypi:open-webui | <= 0.3.8 | No known fixed version | |
Affected Version RangesAll affected versions0.1.124, 0.1.125, 0.2.0, 0.2.1, 0.2.2, 0.2.3, 0.2.4, 0.2.5, 0.3.0, 0.3.1, 0.3.2, 0.3.3, 0.3.4, 0.3.5, 0.3.6, 0.3.7, 0.3.8 |