A path traversal vulnerability exists in the parisneo/lollms-webui, specifically within the 'copy_to_custom_personas' endpoint in the 'lollms_personalities_infos.py' file. This vulnerability allows attackers to read arbitrary files by manipulating the 'category' and 'name' parameters during the 'Copy to custom personas folder for editing' process. By inserting '../' sequences in these parameters, attackers can traverse the directory structure and access files outside of the intended directory. Successful exploitation results in unauthorized access to sensitive information.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: @huntr_ai

Published: 2024-06-02T10:52:32.063Z

Updated: 2024-08-01T19:03:39.289Z

Reserved: 2024-03-04T20:51:54.358Z

Link: CVE-2024-2178

cve-icon Vulnrichment

Updated: 2024-08-01T19:03:39.289Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-06-02T11:15:07.390

Modified: 2024-06-03T14:46:24.250

Link: CVE-2024-2178

cve-icon Redhat

No data.