Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-4v3g-89jr-8hcp

Опубликовано: 16 мая 2024
Источник: github
Github: Не прошло ревью
CVSS3: 8.4

Описание

A path traversal vulnerability exists in the 'save_settings' endpoint of the parisneo/lollms-webui application, affecting versions up to the latest release before 9.5. The vulnerability arises due to insufficient sanitization of the 'config' parameter in the 'apply_settings' function, allowing an attacker to manipulate the application's configuration by sending specially crafted JSON payloads. This could lead to remote code execution (RCE) by bypassing existing patches designed to mitigate such vulnerabilities.

A path traversal vulnerability exists in the 'save_settings' endpoint of the parisneo/lollms-webui application, affecting versions up to the latest release before 9.5. The vulnerability arises due to insufficient sanitization of the 'config' parameter in the 'apply_settings' function, allowing an attacker to manipulate the application's configuration by sending specially crafted JSON payloads. This could lead to remote code execution (RCE) by bypassing existing patches designed to mitigate such vulnerabilities.

EPSS

Процентиль: 63%
0.00449
Низкий

8.4 High

CVSS3

Дефекты

CWE-29

Связанные уязвимости

CVSS3: 8.4
nvd
больше 1 года назад

A path traversal vulnerability exists in the 'save_settings' endpoint of the parisneo/lollms-webui application, affecting versions up to the latest release before 9.5. The vulnerability arises due to insufficient sanitization of the 'config' parameter in the 'apply_settings' function, allowing an attacker to manipulate the application's configuration by sending specially crafted JSON payloads. This could lead to remote code execution (RCE) by bypassing existing patches designed to mitigate such vulnerabilities.

EPSS

Процентиль: 63%
0.00449
Низкий

8.4 High

CVSS3

Дефекты

CWE-29