Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-3p9q-7w63-3f8q

Опубликовано: 20 мар. 2025
Источник: github
Github: Прошло ревью
CVSS3: 6.5

Описание

Open WebUI Allows Arbitrary File Write via the download_model Endpoint

In version 0.3.8 of open-webui/open-webui, an arbitrary file write vulnerability exists in the download_model endpoint. When deployed on Windows, the application improperly handles file paths, allowing an attacker to manipulate the file path to write files to arbitrary locations on the server's filesystem. This can result in overwriting critical system or application files, causing denial of service, or potentially achieving remote code execution (RCE). RCE can allow an attacker to execute malicious code with the privileges of the user running the application, leading to a full system compromise.

Пакеты

Наименование

open-webui

pip
Затронутые версииВерсия исправления

<= 0.3.8

Отсутствует

EPSS

Процентиль: 78%
0.01161
Низкий

6.5 Medium

CVSS3

Дефекты

CWE-29

Связанные уязвимости

CVSS3: 7.2
nvd
11 месяцев назад

In version 0.3.8 of open-webui/open-webui, an arbitrary file write vulnerability exists in the download_model endpoint. When deployed on Windows, the application improperly handles file paths, allowing an attacker to manipulate the file path to write files to arbitrary locations on the server's filesystem. This can result in overwriting critical system or application files, causing denial of service, or potentially achieving remote code execution (RCE). RCE can allow an attacker to execute malicious code with the privileges of the user running the application, leading to a full system compromise.

EPSS

Процентиль: 78%
0.01161
Низкий

6.5 Medium

CVSS3

Дефекты

CWE-29