parisneo/lollms-webui is vulnerable to path traversal attacks that can lead to remote code execution due to insufficient sanitization of user-supplied input in the 'Database path' and 'PDF LaTeX path' settings. An attacker can exploit this vulnerability by manipulating these settings to execute arbitrary code on the targeted server. The issue affects the latest version of the software. The vulnerability stems from the application's handling of the 'discussion_db_name' and 'pdf_latex_path' parameters, which do not properly validate file paths, allowing for directory traversal. This vulnerability can also lead to further file exposure and other attack vectors by manipulating the 'discussion_db_name' parameter.
History

Thu, 17 Oct 2024 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Lollms
Lollms lollms Web Ui
Weaknesses CWE-22
CPEs cpe:2.3:a:lollms:lollms_web_ui:-:*:*:*:*:*:*:*
Vendors & Products Lollms
Lollms lollms Web Ui
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: @huntr_ai

Published: 2024-06-06T18:55:02.078Z

Updated: 2024-08-01T19:11:53.463Z

Reserved: 2024-03-09T23:20:34.518Z

Link: CVE-2024-2360

cve-icon Vulnrichment

Updated: 2024-08-01T19:11:53.463Z

cve-icon NVD

Status : Analyzed

Published: 2024-06-06T19:15:54.570

Modified: 2024-10-17T16:01:37.350

Link: CVE-2024-2360

cve-icon Redhat

No data.