A Path Traversal vulnerability exists in the parisneo/lollms-webui, specifically within the 'add_reference_to_local_mode' function due to the lack of input sanitization. This vulnerability affects versions v9.6 to the latest. By exploiting this vulnerability, an attacker can predict the folders, subfolders, and files present on the victim's computer. The vulnerability is present in the way the application handles the 'path' parameter in HTTP requests to the '/add_reference_to_local_model' endpoint.
References
Configurations
No configuration.
History
21 Nov 2024, 09:43
Type | Values Removed | Values Added |
---|---|---|
References | () https://huntr.com/bounties/740dda3e-7104-4ccf-9ac4-8870e4d6d602 - |
24 Jun 2024, 12:57
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
23 Jun 2024, 15:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-06-23 15:15
Updated : 2024-11-21 09:43
NVD link : CVE-2024-4841
Mitre link : CVE-2024-4841
CVE.ORG link : CVE-2024-4841
JSON object : View
Products Affected
No product.
CWE
CWE-29
Path Traversal: '\..\filename'