A path traversal vulnerability exists in mudler/localai version 2.14.0, where an attacker can exploit the `model` parameter during the model deletion process to delete arbitrary files. Specifically, by crafting a request with a manipulated `model` parameter, an attacker can traverse the directory structure and target files outside of the intended directory, leading to the deletion of sensitive data. This vulnerability is due to insufficient input validation and sanitization of the `model` parameter.
History

Tue, 27 Aug 2024 18:00:00 +0000

Type Values Removed Values Added
First Time appeared Mudler
Mudler localai
CPEs cpe:2.3:a:mudler:localai:*:*:*:*:*:*:*:*
Vendors & Products Mudler
Mudler localai
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: @huntr_ai

Published: 2024-06-19T23:30:38.219Z

Updated: 2024-08-01T21:03:10.990Z

Reserved: 2024-05-21T18:08:53.150Z

Link: CVE-2024-5182

cve-icon Vulnrichment

Updated: 2024-08-01T21:03:10.990Z

cve-icon NVD

Status : Analyzed

Published: 2024-06-20T00:15:09.487

Modified: 2024-08-27T17:30:21.127

Link: CVE-2024-5182

cve-icon Redhat

No data.