A remote code execution (RCE) vulnerability exists in the '/install_extension' endpoint of the parisneo/lollms-webui application, specifically within the `@router.post("/install_extension")` route handler. The vulnerability arises due to improper handling of the `name` parameter in the `ExtensionBuilder().build_extension()` method, which allows for local file inclusion (LFI) leading to arbitrary code execution. An attacker can exploit this vulnerability by crafting a malicious `name` parameter that causes the server to load and execute a `__init__.py` file from an arbitrary location, such as the upload directory for discussions. This vulnerability affects the latest version of parisneo/lollms-webui and can lead to remote code execution without requiring user interaction, especially when the application is exposed to an external endpoint or operated in headless mode.
Metrics
Affected Vendors & Products
References
History
Thu, 17 Oct 2024 20:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Lollms
Lollms lollms Web Ui |
|
Weaknesses | CWE-22 | |
CPEs | cpe:2.3:a:lollms:lollms_web_ui:-:*:*:*:*:*:*:* | |
Vendors & Products |
Lollms
Lollms lollms Web Ui |
|
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: @huntr_ai
Published: 2024-06-06T18:22:40.768Z
Updated: 2024-08-01T20:40:47.180Z
Reserved: 2024-04-29T18:36:38.250Z
Link: CVE-2024-4320
Vulnrichment
Updated: 2024-08-01T20:40:47.180Z
NVD
Status : Analyzed
Published: 2024-06-06T19:16:02.453
Modified: 2024-10-17T20:05:24.287
Link: CVE-2024-4320
Redhat
No data.