parisneo/lollms-webui is vulnerable to path traversal and denial of service attacks due to an exposed `/select_database` endpoint in version a9d16b0. The endpoint improperly handles file paths, allowing attackers to specify absolute paths when interacting with the `DiscussionsDB` instance. This flaw enables attackers to create directories anywhere on the system where the application has permissions, potentially leading to denial of service by creating directories with names of critical files, such as HTTPS certificate files, causing server startup failures. Additionally, attackers can manipulate the database path, resulting in the loss of client data by constantly changing the file location to an attacker-controlled location, scattering the data across the filesystem and making recovery difficult.
History

Tue, 15 Oct 2024 19:30:00 +0000

Type Values Removed Values Added
First Time appeared Lollms
Lollms lollms Web Ui
Weaknesses NVD-CWE-Other
CPEs cpe:2.3:a:lollms:lollms_web_ui:-:*:*:*:*:*:*:*
Vendors & Products Lollms
Lollms lollms Web Ui
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: @huntr_ai

Published: 2024-06-06T18:40:04.036Z

Updated: 2024-08-01T18:56:22.319Z

Reserved: 2024-02-24T23:17:57.497Z

Link: CVE-2024-1873

cve-icon Vulnrichment

Updated: 2024-08-01T18:56:22.319Z

cve-icon NVD

Status : Analyzed

Published: 2024-06-06T19:15:51.460

Modified: 2024-10-15T19:14:09.547

Link: CVE-2024-1873

cve-icon Redhat

No data.