A remote code execution (RCE) vulnerability exists in the '/install_extension' endpoint of the parisneo/lollms-webui application, specifically within the `@router.post("/install_extension")` route handler. The vulnerability arises due to improper handling of the `name` parameter in the `ExtensionBuilder().build_extension()` method, which allows for local file inclusion (LFI) leading to arbitrary code execution. An attacker can exploit this vulnerability by crafting a malicious `name` parameter that causes the server to load and execute a `__init__.py` file from an arbitrary location, such as the upload directory for discussions. This vulnerability affects the latest version of parisneo/lollms-webui and can lead to remote code execution without requiring user interaction, especially when the application is exposed to an external endpoint or operated in headless mode.
History

Thu, 17 Oct 2024 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Lollms
Lollms lollms Web Ui
Weaknesses CWE-22
CPEs cpe:2.3:a:lollms:lollms_web_ui:-:*:*:*:*:*:*:*
Vendors & Products Lollms
Lollms lollms Web Ui
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: @huntr_ai

Published: 2024-06-06T18:22:40.768Z

Updated: 2024-08-01T20:40:47.180Z

Reserved: 2024-04-29T18:36:38.250Z

Link: CVE-2024-4320

cve-icon Vulnrichment

Updated: 2024-08-01T20:40:47.180Z

cve-icon NVD

Status : Analyzed

Published: 2024-06-06T19:16:02.453

Modified: 2024-10-17T20:05:24.287

Link: CVE-2024-4320

cve-icon Redhat

No data.