A vulnerability in parisneo/lollms-webui version 9.8 allows for a Denial of Service (DOS) attack when uploading an audio file. If an attacker appends a large number of characters to the end of a multipart boundary, the system will continuously process each character, rendering lollms-webui inaccessible. This issue is exacerbated by the lack of Cross-Site Request Forgery (CSRF) protection, enabling remote exploitation. The vulnerability leads to service disruption, resource exhaustion, and extended downtime.
History

Sun, 03 Nov 2024 17:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-400

Tue, 22 Oct 2024 14:30:00 +0000

Type Values Removed Values Added
First Time appeared Lollms
Lollms lollms Web Ui
Weaknesses CWE-352
CPEs cpe:2.3:a:lollms:lollms_web_ui:9.8:*:*:*:*:*:*:*
Vendors & Products Lollms
Lollms lollms Web Ui
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H'}


Tue, 15 Oct 2024 14:15:00 +0000

Type Values Removed Values Added
First Time appeared Parisneo
Parisneo lollms-webui
CPEs cpe:2.3:a:parisneo:lollms-webui:9.8:*:*:*:*:*:*:*
Vendors & Products Parisneo
Parisneo lollms-webui
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sun, 13 Oct 2024 12:45:00 +0000

Type Values Removed Values Added
Description A vulnerability in parisneo/lollms-webui version 9.8 allows for a Denial of Service (DOS) attack when uploading an audio file. If an attacker appends a large number of characters to the end of a multipart boundary, the system will continuously process each character, rendering lollms-webui inaccessible. This issue is exacerbated by the lack of Cross-Site Request Forgery (CSRF) protection, enabling remote exploitation. The vulnerability leads to service disruption, resource exhaustion, and extended downtime.
Title Denial of Service (DOS) in multipart boundary while uploading file in parisneo/lollms-webui
Weaknesses CWE-400
References
Metrics cvssV3_0

{'score': 7.1, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: @huntr_ai

Published: 2024-10-13T12:28:19.491Z

Updated: 2024-11-03T18:27:25.639Z

Reserved: 2024-07-20T22:27:51.135Z

Link: CVE-2024-6959

cve-icon Vulnrichment

Updated: 2024-10-15T13:42:37.784Z

cve-icon NVD

Status : Modified

Published: 2024-10-13T13:15:10.880

Modified: 2024-11-03T17:15:15.193

Link: CVE-2024-6959

cve-icon Redhat

No data.