Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-jgmp-p428-99m5

Опубликовано: 16 мая 2024
Источник: github
Github: Не прошло ревью
CVSS3: 9

Описание

A remote code execution vulnerability exists in the parisneo/lollms-webui application, specifically within the reinstall_binding functionality in lollms_core/lollms/server/endpoints/lollms_binding_infos.py of the latest version. The vulnerability arises due to insufficient path sanitization, allowing an attacker to exploit path traversal to navigate to arbitrary directories. By manipulating the binding_path to point to a controlled directory and uploading a malicious init.py file, an attacker can execute arbitrary code on the server.

A remote code execution vulnerability exists in the parisneo/lollms-webui application, specifically within the reinstall_binding functionality in lollms_core/lollms/server/endpoints/lollms_binding_infos.py of the latest version. The vulnerability arises due to insufficient path sanitization, allowing an attacker to exploit path traversal to navigate to arbitrary directories. By manipulating the binding_path to point to a controlled directory and uploading a malicious init.py file, an attacker can execute arbitrary code on the server.

EPSS

Процентиль: 84%
0.02287
Низкий

9 Critical

CVSS3

Дефекты

CWE-77

Связанные уязвимости

CVSS3: 9
nvd
больше 1 года назад

A remote code execution vulnerability exists in the parisneo/lollms-webui application, specifically within the reinstall_binding functionality in lollms_core/lollms/server/endpoints/lollms_binding_infos.py of the latest version. The vulnerability arises due to insufficient path sanitization, allowing an attacker to exploit path traversal to navigate to arbitrary directories. By manipulating the binding_path to point to a controlled directory and uploading a malicious __init__.py file, an attacker can execute arbitrary code on the server.

EPSS

Процентиль: 84%
0.02287
Низкий

9 Critical

CVSS3

Дефекты

CWE-77