CVE-2024-1602

parisneo/lollms-webui is vulnerable to stored Cross-Site Scripting (XSS) that leads to Remote Code Execution (RCE). The vulnerability arises due to inadequate sanitization and validation of model output data, allowing an attacker to inject malicious JavaScript code. This code can be executed within the user's browser context, enabling the attacker to send a request to the `/execute_code` endpoint and establish a reverse shell to the attacker's host. The issue affects various components of the application, including the handling of user input and model output.
Configurations

No configuration.

History

21 Nov 2024, 08:50

Type Values Removed Values Added
Summary
  • (es) parisneo/lollms-webui es vulnerable a Cross Site Scripting (XSS) almacenado que conducen a la ejecución remota de código (RCE). La vulnerabilidad surge debido a una desinfección y validación inadecuadas de los datos de salida del modelo, lo que permite a un atacante inyectar código JavaScript malicioso. Este código se puede ejecutar dentro del contexto del navegador del usuario, lo que permite al atacante enviar una solicitud al endpoint `/execute_code` y establecer un shell inverso al host del atacante. El problema afecta a varios componentes de la aplicación, incluido el manejo de la entrada del usuario y la salida del modelo.
References () https://huntr.com/bounties/59be0d5a-f18e-4418-8f29-72320269a097 - () https://huntr.com/bounties/59be0d5a-f18e-4418-8f29-72320269a097 -

10 Apr 2024, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-10 17:15

Updated : 2024-11-21 08:50


NVD link : CVE-2024-1602

Mitre link : CVE-2024-1602

CVE.ORG link : CVE-2024-1602


JSON object : View

Products Affected

No product.

CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')