Description
A remote code execution vulnerability exists in the create_conda_env function of the parisneo/lollms repository, version 5.9.0. The vulnerability arises from the use of shell=True in the subprocess.Popen function, which allows an attacker to inject arbitrary commands by manipulating the env_name and python_version parameters. This issue could lead to a serious security breach as demonstrated by the ability to execute the 'whoami' command among potentially other harmful commands.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-1959 | A remote code execution vulnerability exists in the create_conda_env function of the parisneo/lollms repository, version 5.9.0. The vulnerability arises from the use of shell=True in the subprocess.Popen function, which allows an attacker to inject arbitrary commands by manipulating the env_name and python_version parameters. This issue could lead to a serious security breach as demonstrated by the ability to execute the 'whoami' command among potentially other harmful commands. |
Github GHSA |
GHSA-79h8-gxhq-q3jg | Remote Code Execution in create_conda_env function in lollms |
References
History
Fri, 13 Sep 2024 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Lollms
Lollms lollms |
|
| Weaknesses | CWE-78 | |
| CPEs | cpe:2.3:a:lollms:lollms:5.9.0:*:*:*:*:*:*:* | |
| Vendors & Products |
Lollms
Lollms lollms |
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: @huntr_ai
Published:
Updated: 2024-08-01T19:32:42.719Z
Reserved: 2024-03-31T19:18:08.417Z
Link: CVE-2024-3121
Updated: 2024-08-01T19:32:42.719Z
Status : Modified
Published: 2024-06-24T00:15:09.680
Modified: 2024-11-21T09:28:56.843
Link: CVE-2024-3121
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA