An SQL injection vulnerability exists in the `delete_discussion()` function of the parisneo/lollms-webui application, allowing an attacker to delete all discussions and message data. The vulnerability is exploitable via a crafted HTTP POST request to the `/delete_discussion` endpoint, which internally calls the vulnerable `delete_discussion()` function. By sending a specially crafted payload in the 'id' parameter, an attacker can manipulate SQL queries to delete all records from the 'discussion' and 'message' tables. This issue is due to improper neutralization of special elements used in an SQL command.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: @huntr_ai

Published: 2024-04-16T00:00:14.318Z

Updated: 2024-08-01T18:48:21.597Z

Reserved: 2024-02-17T02:25:45.921Z

Link: CVE-2024-1601

cve-icon Vulnrichment

Updated: 2024-08-01T18:48:21.597Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-04-16T00:15:09.597

Modified: 2024-04-16T13:24:07.103

Link: CVE-2024-1601

cve-icon Redhat

No data.