Products
parisneo/lollms-webui
- 9.5
Source
security@huntr.dev
Tags
CVE-2024-4267 details
Last Modified : May 22, 2024, 8:15 p.m.
Description
A remote code execution (RCE) vulnerability exists in the parisneo/lollms-webui, specifically within the 'open_file' module, version 9.5. The vulnerability arises due to improper neutralization of special elements used in a command within the 'open_file' function. An attacker can exploit this vulnerability by crafting a malicious file path that, when processed by the 'open_file' function, executes arbitrary system commands or reads sensitive file content. This issue is present in the code where subprocess.Popen is used unsafely to open files based on user-supplied paths without adequate validation, leading to potential command injection.
CVSS Score
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8.4 | 9 | 10 |
---|
Weakness
Weakness | Name | Description |
---|
CVSS Data
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
Base Score
8.4
Exploitability Score
Impact Score
Base Severity
HIGH
Vector String : CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
References
URL | Source |
---|---|
https://huntr.com/bounties/5a127724-cc13-4ea6-b81f-41546a7fff81 | security@huntr.dev |