A Local File Inclusion (LFI) vulnerability exists in the parisneo/lollms-webui application, specifically within the `/personalities` route. An attacker can exploit this vulnerability by crafting a URL that includes directory traversal sequences (`../../`) followed by the desired system file path, URL encoded. Successful exploitation allows the attacker to read any file on the filesystem accessible by the web server. This issue arises due to improper control of filename for include/require statement in the application.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: @huntr_ai
Published: 2024-04-10T17:07:58.422Z
Updated: 2024-08-01T18:48:21.876Z
Reserved: 2024-02-17T01:51:04.301Z
Link: CVE-2024-1600
Vulnrichment
Updated: 2024-08-01T18:48:21.876Z
NVD
Status : Awaiting Analysis
Published: 2024-04-10T17:15:52.317
Modified: 2024-04-10T19:49:51.183
Link: CVE-2024-1600
Redhat
No data.