A Local File Inclusion (LFI) vulnerability exists in the parisneo/lollms-webui application, specifically within the `/personalities` route. An attacker can exploit this vulnerability by crafting a URL that includes directory traversal sequences (`../../`) followed by the desired system file path, URL encoded. Successful exploitation allows the attacker to read any file on the filesystem accessible by the web server. This issue arises due to improper control of filename for include/require statement in the application.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: @huntr_ai

Published: 2024-04-10T17:07:58.422Z

Updated: 2024-08-01T18:48:21.876Z

Reserved: 2024-02-17T01:51:04.301Z

Link: CVE-2024-1600

cve-icon Vulnrichment

Updated: 2024-08-01T18:48:21.876Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-04-10T17:15:52.317

Modified: 2024-04-10T19:49:51.183

Link: CVE-2024-1600

cve-icon Redhat

No data.