A remote code execution vulnerability exists in the create_conda_env function of the parisneo/lollms repository, version 5.9.0. The vulnerability arises from the use of shell=True in the subprocess.Popen function, which allows an attacker to inject arbitrary commands by manipulating the env_name and python_version parameters. This issue could lead to a serious security breach as demonstrated by the ability to execute the 'whoami' command among potentially other harmful commands.
History

Fri, 13 Sep 2024 16:00:00 +0000

Type Values Removed Values Added
First Time appeared Lollms
Lollms lollms
Weaknesses CWE-78
CPEs cpe:2.3:a:lollms:lollms:5.9.0:*:*:*:*:*:*:*
Vendors & Products Lollms
Lollms lollms
Metrics cvssV3_1

{'score': 3.3, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: @huntr_ai

Published: 2024-06-24T00:00:14.165Z

Updated: 2024-08-01T19:32:42.719Z

Reserved: 2024-03-31T19:18:08.417Z

Link: CVE-2024-3121

cve-icon Vulnrichment

Updated: 2024-08-01T19:32:42.719Z

cve-icon NVD

Status : Analyzed

Published: 2024-06-24T00:15:09.680

Modified: 2024-09-13T15:44:28.723

Link: CVE-2024-3121

cve-icon Redhat

No data.