Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-p8h7-c8gw-6x8c

Опубликовано: 06 июн. 2024
Источник: github
Github: Прошло ревью
CVSS4: 7.7
CVSS3: 7.5

Описание

LoLLMS Path Traversal vulnerability

A path traversal vulnerability exists in the parisneo/lollms application, affecting version 9.4.0 and potentially earlier versions, but fixed in version 9.5.0. The vulnerability arises due to improper validation of file paths between Windows and Linux environments, allowing attackers to traverse beyond the intended directory and read any file on the Windows system. Specifically, the application fails to adequately sanitize file paths containing backslashes (\), which can be exploited to access the root directory and read, or even delete, sensitive files. This issue was discovered in the context of the /user_infos endpoint, where a crafted request using backslashes to reference a file (e.g., \windows\win.ini) could result in unauthorized file access. The impact of this vulnerability includes the potential for attackers to access sensitive information such as environment variables, database files, and configuration files, which could lead to further compromise of the system.

Пакеты

Наименование

lollms

pip
Затронутые версииВерсия исправления

< 9.5.0

9.5.0

EPSS

Процентиль: 54%
0.00311
Низкий

7.7 High

CVSS4

7.5 High

CVSS3

Дефекты

CWE-22
CWE-36

Связанные уязвимости

CVSS3: 7.5
nvd
больше 1 года назад

A path traversal vulnerability exists in the parisneo/lollms application, affecting version 9.4.0 and potentially earlier versions, but fixed in version 5.9.0. The vulnerability arises due to improper validation of file paths between Windows and Linux environments, allowing attackers to traverse beyond the intended directory and read any file on the Windows system. Specifically, the application fails to adequately sanitize file paths containing backslashes (`\`), which can be exploited to access the root directory and read, or even delete, sensitive files. This issue was discovered in the context of the `/user_infos` endpoint, where a crafted request using backslashes to reference a file (e.g., `\windows\win.ini`) could result in unauthorized file access. The impact of this vulnerability includes the potential for attackers to access sensitive information such as environment variables, database files, and configuration files, which could lead to further compromise of the system.

EPSS

Процентиль: 54%
0.00311
Низкий

7.7 High

CVSS4

7.5 High

CVSS3

Дефекты

CWE-22
CWE-36