CVE-2024-4267

May 22, 2024, 8:15 p.m.

Received
CVE has been recently published to the CVE List and has been received by the NVD.

Products

parisneo/lollms-webui

  • 9.5

Source

security@huntr.dev

Tags

CVE-2024-4267 details

Published : May 22, 2024, 8:15 p.m.
Last Modified : May 22, 2024, 8:15 p.m.

Description

A remote code execution (RCE) vulnerability exists in the parisneo/lollms-webui, specifically within the 'open_file' module, version 9.5. The vulnerability arises due to improper neutralization of special elements used in a command within the 'open_file' function. An attacker can exploit this vulnerability by crafting a malicious file path that, when processed by the 'open_file' function, executes arbitrary system commands or reads sensitive file content. This issue is present in the code where subprocess.Popen is used unsafely to open files based on user-supplied paths without adequate validation, leading to potential command injection.

CVSS Score

1 2 3 4 5 6 7 8.4 9 10

Weakness

Weakness Name Description

CVSS Data

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

Base Score

8.4

Exploitability Score

Impact Score

Base Severity

HIGH

References

URL Source
https://huntr.com/bounties/5a127724-cc13-4ea6-b81f-41546a7fff81 security@huntr.dev
This website uses the NVD API, but is not approved or certified by it.