Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-pwc9-q4hj-pg8g

Опубликовано: 16 мая 2024
Источник: github
Github: Прошло ревью
CVSS4: 8.9
CVSS3: 9.8

Описание

LoLLMS Command Injection vulnerability

A vulnerability in the parisneo/lollms, specifically in the /unInstall_binding endpoint, allows for arbitrary code execution due to insufficient sanitization of user input. The issue arises from the lack of path sanitization when handling the name parameter in the unInstall_binding function, allowing an attacker to traverse directories and execute arbitrary code by loading a malicious __init__.py file. This vulnerability affects the latest version of the software. The exploitation of this vulnerability could lead to remote code execution on the system where parisneo/lollms is deployed.

Пакеты

Наименование

lollms

pip
Затронутые версииВерсия исправления

< 9.5.0

9.5.0

EPSS

Процентиль: 93%
0.09758
Низкий

8.9 High

CVSS4

9.8 Critical

CVSS3

Дефекты

CWE-77

Связанные уязвимости

CVSS3: 9.8
nvd
больше 1 года назад

A vulnerability in the parisneo/lollms, specifically in the `/unInstall_binding` endpoint, allows for arbitrary code execution due to insufficient sanitization of user input. The issue arises from the lack of path sanitization when handling the `name` parameter in the `unInstall_binding` function, allowing an attacker to traverse directories and execute arbitrary code by loading a malicious `__init__.py` file. This vulnerability affects the latest version of the software. The exploitation of this vulnerability could lead to remote code execution on the system where parisneo/lollms is deployed.

EPSS

Процентиль: 93%
0.09758
Низкий

8.9 High

CVSS4

9.8 Critical

CVSS3

Дефекты

CWE-77