A vulnerability in parisneo/lollms-webui versions up to 9.3 allows remote attackers to execute arbitrary code. The vulnerability stems from insufficient protection of the `/apply_settings` and `/execute_code` endpoints. Attackers can bypass protections by setting the host to localhost, enabling code execution, and disabling code validation through the `/apply_settings` endpoint. Subsequently, arbitrary commands can be executed remotely via the `/execute_code` endpoint, exploiting the delay in settings enforcement. This issue was addressed in version 9.5.
References
Configurations
No configuration.
History
21 Nov 2024, 09:42
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/parisneo/lollms-webui/commit/abb4c6d495a95a3ef5b114ffc57f85cd650b905e - | |
References | () https://huntr.com/bounties/2ab9f03d-0538-4317-be21-0748a079cbdd - | |
Summary |
|
16 May 2024, 09:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-05-16 09:15
Updated : 2024-11-21 09:42
NVD link : CVE-2024-4326
Mitre link : CVE-2024-4326
CVE.ORG link : CVE-2024-4326
JSON object : View
Products Affected
No product.
CWE
CWE-15
External Control of System or Configuration Setting