parisneo/lollms-webui is vulnerable to stored Cross-Site Scripting (XSS) that leads to Remote Code Execution (RCE). The vulnerability arises due to inadequate sanitization and validation of model output data, allowing an attacker to inject malicious JavaScript code. This code can be executed within the user's browser context, enabling the attacker to send a request to the `/execute_code` endpoint and establish a reverse shell to the attacker's host. The issue affects various components of the application, including the handling of user input and model output.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: @huntr_ai
Published: 2024-04-10T17:08:02.423Z
Updated: 2024-08-01T18:48:21.887Z
Reserved: 2024-02-18T00:13:27.756Z
Link: CVE-2024-1602
Vulnrichment
Updated: 2024-08-01T18:48:21.887Z
NVD
Status : Awaiting Analysis
Published: 2024-04-10T17:15:52.537
Modified: 2024-04-10T19:49:51.183
Link: CVE-2024-1602
Redhat
No data.