Products
parisneo/lollms
parisneo/lollms
- Unknown
Source
security@huntr.dev
Tags
CVE-2024-4078 details
Last Modified : May 16, 2024, 1:03 p.m.
Description
A vulnerability in the parisneo/lollms, specifically in the `/unInstall_binding` endpoint, allows for arbitrary code execution due to insufficient sanitization of user input. The issue arises from the lack of path sanitization when handling the `name` parameter in the `unInstall_binding` function, allowing an attacker to traverse directories and execute arbitrary code by loading a malicious `__init__.py` file. This vulnerability affects the latest version of the software. The exploitation of this vulnerability could lead to remote code execution on the system where parisneo/lollms is deployed.
CVSS Score
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9.8 | 10 |
---|
Weakness
Weakness | Name | Description |
---|
CVSS Data
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
Base Score
9.8
Exploitability Score
Impact Score
Base Severity
CRITICAL
Vector String : CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
References
URL | Source |
---|---|
https://github.com/parisneo/lollms/commit/7ebe08da7e0026b155af4f7be1d6417bc64cf02f | security@huntr.dev |
https://huntr.com/bounties/a55a8c04-df44-49b2-bcfa-2a2b728a299d | security@huntr.dev |