Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-cpcx-r2gq-x893

Опубликовано: 20 июн. 2024
Источник: github
Github: Прошло ревью
CVSS4: 8.7
CVSS3: 7.5

Описание

LocalAI path traversal vulnerability

A path traversal vulnerability exists in mudler/localai version 2.14.0, where an attacker can exploit the model parameter during the model deletion process to delete arbitrary files. Specifically, by crafting a request with a manipulated model parameter, an attacker can traverse the directory structure and target files outside of the intended directory, leading to the deletion of sensitive data. This vulnerability is due to insufficient input validation and sanitization of the model parameter.

Пакеты

Наименование

github.com/go-skynet/LocalAI

go
Затронутые версииВерсия исправления

< 2.16.0

2.16.0

EPSS

Процентиль: 85%
0.02492
Низкий

8.7 High

CVSS4

7.5 High

CVSS3

Дефекты

CWE-22

Связанные уязвимости

CVSS3: 9.1
nvd
больше 1 года назад

A path traversal vulnerability exists in mudler/localai version 2.14.0, where an attacker can exploit the `model` parameter during the model deletion process to delete arbitrary files. Specifically, by crafting a request with a manipulated `model` parameter, an attacker can traverse the directory structure and target files outside of the intended directory, leading to the deletion of sensitive data. This vulnerability is due to insufficient input validation and sanitization of the `model` parameter.

EPSS

Процентиль: 85%
0.02492
Низкий

8.7 High

CVSS4

7.5 High

CVSS3

Дефекты

CWE-22