Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-crh6-pj8c-xrhc

Опубликовано: 20 мар. 2025
Источник: github
Github: Прошло ревью
CVSS3: 6.5

Описание

Open WebUI Allows Arbitrary File Write via the /models/upload Endpoint

In open-webui version 0.3.8, the endpoint /models/upload is vulnerable to arbitrary file write due to improper handling of user-supplied filenames. The vulnerability arises from the usage of file_path = f"{UPLOAD_DIR}/{file.filename}" without proper input validation or sanitization. An attacker can exploit this by manipulating the file.filename parameter to include directory traversal sequences, causing the resulting file_path to escape the intended UPLOAD_DIR and potentially overwrite arbitrary files on the system. This can lead to unauthorized modifications of system binaries, configuration files, or sensitive data, potentially enabling remote command execution.

Пакеты

Наименование

open-webui

pip
Затронутые версииВерсия исправления

<= 0.3.8

Отсутствует

EPSS

Процентиль: 86%
0.02992
Низкий

6.5 Medium

CVSS3

Дефекты

CWE-22

Связанные уязвимости

CVSS3: 7.2
nvd
11 месяцев назад

In open-webui version 0.3.8, the endpoint `/models/upload` is vulnerable to arbitrary file write due to improper handling of user-supplied filenames. The vulnerability arises from the usage of `file_path = f"{UPLOAD_DIR}/{file.filename}"` without proper input validation or sanitization. An attacker can exploit this by manipulating the `file.filename` parameter to include directory traversal sequences, causing the resulting `file_path` to escape the intended `UPLOAD_DIR` and potentially overwrite arbitrary files on the system. This can lead to unauthorized modifications of system binaries, configuration files, or sensitive data, potentially enabling remote command execution.

EPSS

Процентиль: 86%
0.02992
Низкий

6.5 Medium

CVSS3

Дефекты

CWE-22