A path traversal vulnerability in the `/set_personality_config` endpoint of parisneo/lollms version 9.4.0 allows an attacker to overwrite the `configs/config.yaml` file. This can lead to remote code execution by changing server configuration properties such as `force_accept_remote_access` and `turn_on_code_validation`.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-2097 A path traversal vulnerability in the `/set_personality_config` endpoint of parisneo/lollms version 9.4.0 allows an attacker to overwrite the `configs/config.yaml` file. This can lead to remote code execution by changing server configuration properties such as `force_accept_remote_access` and `turn_on_code_validation`.
Github GHSA Github GHSA GHSA-m45c-v46h-c788 lollms path traversal vulnerability allows overriding of config.yaml file, leading to RCE
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: @huntr_ai

Published:

Updated: 2024-08-01T21:25:03.266Z

Reserved: 2024-06-10T21:22:49.891Z

Link: CVE-2024-5824

cve-icon Vulnrichment

Updated: 2024-08-01T21:25:03.266Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-06-27T19:15:17.117

Modified: 2024-11-21T09:48:24.360

Link: CVE-2024-5824

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-07-12T23:06:34Z