A path traversal vulnerability exists in the parisneo/lollms-webui, specifically within the 'copy_to_custom_personas' endpoint in the 'lollms_personalities_infos.py' file. This vulnerability allows attackers to read arbitrary files by manipulating the 'category' and 'name' parameters during the 'Copy to custom personas folder for editing' process. By inserting '../' sequences in these parameters, attackers can traverse the directory structure and access files outside of the intended directory. Successful exploitation results in unauthorized access to sensitive information.
References
Configurations
No configuration.
History
21 Nov 2024, 09:09
Type | Values Removed | Values Added |
---|---|---|
References | () https://huntr.com/bounties/e585f1dd-a026-4419-8f42-5835e85fad9e - |
03 Jun 2024, 14:46
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
02 Jun 2024, 11:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-06-02 11:15
Updated : 2024-11-21 09:09
NVD link : CVE-2024-2178
Mitre link : CVE-2024-2178
CVE.ORG link : CVE-2024-2178
JSON object : View
Products Affected
No product.
CWE
CWE-29
Path Traversal: '\..\filename'