A path traversal vulnerability exists in the XTTS server included in the lollms package, version v9.6. This vulnerability arises from the ability to perform an unauthenticated root folder settings change. Although the read file endpoint is protected against path traversals, this protection can be bypassed by changing the root folder to '/'. This allows attackers to read arbitrary files on the system. Additionally, the output folders can be changed to write arbitrary audio files to any location on the system.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-2001 | A path traversal vulnerability exists in the XTTS server included in the lollms package, version v9.6. This vulnerability arises from the ability to perform an unauthenticated root folder settings change. Although the read file endpoint is protected against path traversals, this protection can be bypassed by changing the root folder to '/'. This allows attackers to read arbitrary files on the system. Additionally, the output folders can be changed to write arbitrary audio files to any location on the system. |
Github GHSA |
GHSA-9chm-m6x2-6fvc | lollms vulnerable to path traversal due to unauthenticated root folder settings change |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: @huntr_ai
Published:
Updated: 2024-08-01T21:25:03.365Z
Reserved: 2024-06-17T17:39:09.676Z
Link: CVE-2024-6085
Updated: 2024-08-01T21:25:03.365Z
Status : Awaiting Analysis
Published: 2024-06-27T19:15:19.287
Modified: 2024-11-21T09:48:55.923
Link: CVE-2024-6085
No data.
OpenCVE Enrichment
Updated: 2025-07-12T22:24:02Z
EUVD
Github GHSA