CVE-2024-2624

A path traversal and arbitrary file upload vulnerability exists in the parisneo/lollms-webui application, specifically within the `@router.get("/switch_personal_path")` endpoint in `./lollms-webui/lollms_core/lollms/server/endpoints/lollms_user.py`. The vulnerability arises due to insufficient sanitization of user-supplied input for the `path` parameter, allowing an attacker to specify arbitrary file system paths. This flaw enables direct arbitrary file uploads, leakage of `personal_data`, and overwriting of configurations in `lollms-webui`->`configs` by exploiting the same named directory in `personal_data`. The issue affects the latest version of the application and is fixed in version 9.4. Successful exploitation could lead to sensitive information disclosure, unauthorized file uploads, and potentially remote code execution by overwriting critical configuration files.
Configurations

Configuration 1 (hide)

cpe:2.3:a:lollms:lollms_web_ui:*:*:*:*:*:*:*:*

History

21 Nov 2024, 09:10

Type Values Removed Values Added
References () https://github.com/parisneo/lollms-webui/commit/aeba79f3ea934331b8ecd625a58bae6e4f7e7d3f - Patch () https://github.com/parisneo/lollms-webui/commit/aeba79f3ea934331b8ecd625a58bae6e4f7e7d3f - Patch
References () https://huntr.com/bounties/39e17897-0e92-4473-91c7-f728322191aa - Exploit, Third Party Advisory () https://huntr.com/bounties/39e17897-0e92-4473-91c7-f728322191aa - Exploit, Third Party Advisory

15 Oct 2024, 18:49

Type Values Removed Values Added
First Time Lollms lollms Web Ui
Lollms
References () https://github.com/parisneo/lollms-webui/commit/aeba79f3ea934331b8ecd625a58bae6e4f7e7d3f - () https://github.com/parisneo/lollms-webui/commit/aeba79f3ea934331b8ecd625a58bae6e4f7e7d3f - Patch
References () https://huntr.com/bounties/39e17897-0e92-4473-91c7-f728322191aa - () https://huntr.com/bounties/39e17897-0e92-4473-91c7-f728322191aa - Exploit, Third Party Advisory
CVSS v2 : unknown
v3 : 9.4
v2 : unknown
v3 : 9.8
CWE CWE-22
CPE cpe:2.3:a:lollms:lollms_web_ui:*:*:*:*:*:*:*:*

07 Jun 2024, 14:56

Type Values Removed Values Added
Summary
  • (es) Existe una vulnerabilidad de path traversal y carga de archivos arbitrarios en la aplicación parisneo/lollms-webui, específicamente dentro del endpoint `@router.get("/switch_personal_path")` en `./lollms-webui/lollms_core/lollms/server/endpoints/ lollms_user.py`. La vulnerabilidad surge debido a una sanitización insuficiente de la entrada proporcionada por el usuario para el parámetro "ruta", lo que permite a un atacante especificar rutas arbitrarias del sistema de archivos. Esta falla permite la carga directa de archivos arbitrarios, la fuga de `personal_data` y la sobrescritura de configuraciones en `lollms-webui`->`configs` al explotar el mismo directorio con el mismo nombre en `personal_data`. El problema afecta a la última versión de la aplicación y se solucionó en la versión 9.4. Una explotación exitosa podría conducir a la divulgación de información confidencial, cargas de archivos no autorizadas y ejecución potencialmente remota de código al sobrescribir archivos de configuración críticos.

06 Jun 2024, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-06 19:15

Updated : 2024-11-21 09:10


NVD link : CVE-2024-2624

Mitre link : CVE-2024-2624

CVE.ORG link : CVE-2024-2624


JSON object : View

Products Affected

lollms

  • lollms_web_ui
CWE
CWE-29

Path Traversal: '\..\filename'

CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')