mudler/localai version 2.17.1 is vulnerable to remote code execution. The vulnerability arises because the localai backend receives inputs not only from the configuration file but also from other inputs, allowing an attacker to upload a binary file and execute malicious code. This can lead to the attacker gaining full control over the system.
Metrics
Affected Vendors & Products
References
History
Fri, 27 Sep 2024 18:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Mudler
Mudler localai |
|
CPEs | cpe:2.3:a:mudler:localai:*:*:*:*:*:*:*:* | |
Vendors & Products |
Mudler
Mudler localai |
|
Metrics |
ssvc
|
Fri, 27 Sep 2024 16:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | mudler/localai version 2.17.1 is vulnerable to remote code execution. The vulnerability arises because the localai backend receives inputs not only from the configuration file but also from other inputs, allowing an attacker to upload a binary file and execute malicious code. This can lead to the attacker gaining full control over the system. | |
Title | Remote Code Execution in mudler/localai | |
Weaknesses | CWE-94 | |
References |
| |
Metrics |
cvssV3_0
|
MITRE
Status: PUBLISHED
Assigner: @huntr_ai
Published: 2024-09-27T15:43:51.011Z
Updated: 2024-09-27T17:48:42.450Z
Reserved: 2024-07-22T21:20:58.493Z
Link: CVE-2024-6983
Vulnrichment
Updated: 2024-09-27T17:48:35.687Z
NVD
Status : Awaiting Analysis
Published: 2024-09-27T16:15:06.533
Modified: 2024-09-30T12:45:57.823
Link: CVE-2024-6983
Redhat
No data.