Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-54c7-72v9-gm27

Опубликовано: 20 мар. 2025
Источник: github
Github: Не прошло ревью
CVSS3: 6.6

Описание

In version v12 of parisneo/lollms-webui, the 'Send file to AL' function allows uploading files with various extensions, including potentially dangerous ones like .py, .sh, .bat, and more. Attackers can exploit this by uploading files with malicious content and then using the '/open_file' API endpoint to execute these files. The vulnerability arises from the use of 'subprocess.Popen' to open files without proper validation, leading to potential remote code execution.

In version v12 of parisneo/lollms-webui, the 'Send file to AL' function allows uploading files with various extensions, including potentially dangerous ones like .py, .sh, .bat, and more. Attackers can exploit this by uploading files with malicious content and then using the '/open_file' API endpoint to execute these files. The vulnerability arises from the use of 'subprocess.Popen' to open files without proper validation, leading to potential remote code execution.

EPSS

Процентиль: 75%
0.00891
Низкий

6.6 Medium

CVSS3

Дефекты

CWE-434

Связанные уязвимости

CVSS3: 8.8
nvd
11 месяцев назад

In version v12 of parisneo/lollms-webui, the 'Send file to AL' function allows uploading files with various extensions, including potentially dangerous ones like .py, .sh, .bat, and more. Attackers can exploit this by uploading files with malicious content and then using the '/open_file' API endpoint to execute these files. The vulnerability arises from the use of 'subprocess.Popen' to open files without proper validation, leading to potential remote code execution.

EPSS

Процентиль: 75%
0.00891
Низкий

6.6 Medium

CVSS3

Дефекты

CWE-434