A path traversal vulnerability exists in the parisneo/lollms-webui, specifically within the 'copy_to_custom_personas' endpoint in the 'lollms_personalities_infos.py' file. This vulnerability allows attackers to read arbitrary files by manipulating the 'category' and 'name' parameters during the 'Copy to custom personas folder for editing' process. By inserting '../' sequences in these parameters, attackers can traverse the directory structure and access files outside of the intended directory. Successful exploitation results in unauthorized access to sensitive information.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: @huntr_ai
Published: 2024-06-02T10:52:32.063Z
Updated: 2024-08-01T19:03:39.289Z
Reserved: 2024-03-04T20:51:54.358Z
Link: CVE-2024-2178
Vulnrichment
Updated: 2024-08-01T19:03:39.289Z
NVD
Status : Awaiting Analysis
Published: 2024-06-02T11:15:07.390
Modified: 2024-06-03T14:46:24.250
Link: CVE-2024-2178
Redhat
No data.