A path traversal vulnerability exists in mudler/localai version 2.14.0, where an attacker can exploit the `model` parameter during the model deletion process to delete arbitrary files. Specifically, by crafting a request with a manipulated `model` parameter, an attacker can traverse the directory structure and target files outside of the intended directory, leading to the deletion of sensitive data. This vulnerability is due to insufficient input validation and sanitization of the `model` parameter.
Metrics
Affected Vendors & Products
References
History
Tue, 27 Aug 2024 18:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Mudler
Mudler localai |
|
CPEs | cpe:2.3:a:mudler:localai:*:*:*:*:*:*:*:* | |
Vendors & Products |
Mudler
Mudler localai |
|
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: @huntr_ai
Published: 2024-06-19T23:30:38.219Z
Updated: 2024-08-01T21:03:10.990Z
Reserved: 2024-05-21T18:08:53.150Z
Link: CVE-2024-5182
Vulnrichment
Updated: 2024-08-01T21:03:10.990Z
NVD
Status : Modified
Published: 2024-06-20T00:15:09.487
Modified: 2024-11-21T09:47:08.590
Link: CVE-2024-5182
Redhat
No data.