Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-p4vx-w5q8-cq9j

Опубликовано: 23 июн. 2024
Источник: github
Github: Не прошло ревью
CVSS3: 4

Описание

A Path Traversal vulnerability exists in the parisneo/lollms-webui, specifically within the 'add_reference_to_local_mode' function due to the lack of input sanitization. This vulnerability affects versions v9.6 to the latest. By exploiting this vulnerability, an attacker can predict the folders, subfolders, and files present on the victim's computer. The vulnerability is present in the way the application handles the 'path' parameter in HTTP requests to the '/add_reference_to_local_model' endpoint.

A Path Traversal vulnerability exists in the parisneo/lollms-webui, specifically within the 'add_reference_to_local_mode' function due to the lack of input sanitization. This vulnerability affects versions v9.6 to the latest. By exploiting this vulnerability, an attacker can predict the folders, subfolders, and files present on the victim's computer. The vulnerability is present in the way the application handles the 'path' parameter in HTTP requests to the '/add_reference_to_local_model' endpoint.

EPSS

Процентиль: 93%
0.09339
Низкий

4 Medium

CVSS3

Дефекты

CWE-29

Связанные уязвимости

CVSS3: 3.3
nvd
больше 1 года назад

A Path Traversal vulnerability exists in the parisneo/lollms-webui, specifically within the 'add_reference_to_local_mode' function due to the lack of input sanitization. This vulnerability affects versions v9.6 to the latest. By exploiting this vulnerability, an attacker can predict the folders, subfolders, and files present on the victim's computer. The vulnerability is present in the way the application handles the 'path' parameter in HTTP requests to the '/add_reference_to_local_model' endpoint.

EPSS

Процентиль: 93%
0.09339
Низкий

4 Medium

CVSS3

Дефекты

CWE-29