Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-v9w6-9hq9-33ch

Опубликовано: 27 июн. 2025
Источник: github
Github: Прошло ревью
CVSS4: 4.8
CVSS3: 5.3

Описание

HKUDS LightRAG allows Path Traversal via function upload_to_input_dir

A vulnerability was found in HKUDS LightRAG up to 1.3.8. It has been declared as critical. Affected by this vulnerability is the function upload_to_input_dir of the file lightrag/api/routers/document_routes.py of the component File Upload. The manipulation of the argument file.filename leads to path traversal. It is possible to launch the attack on the local host. The identifier of the patch is 60777d535b719631680bcf5d0969bdef79ca4eaf. It is recommended to apply a patch to fix this issue.

Пакеты

Наименование

lightrag-hku

pip
Затронутые версииВерсия исправления

< 1.3.8

1.3.8

EPSS

Процентиль: 1%
0.00011
Низкий

4.8 Medium

CVSS4

5.3 Medium

CVSS3

Дефекты

CWE-22

Связанные уязвимости

CVSS3: 5.3
nvd
7 месяцев назад

A vulnerability was found in HKUDS LightRAG up to 1.3.8. It has been declared as critical. Affected by this vulnerability is the function upload_to_input_dir of the file lightrag/api/routers/document_routes.py of the component File Upload. The manipulation of the argument file.filename leads to path traversal. It is possible to launch the attack on the local host. The identifier of the patch is 60777d535b719631680bcf5d0969bdef79ca4eaf. It is recommended to apply a patch to fix this issue.

CVSS3: 5.3
fstec
8 месяцев назад

Уязвимость функции upload_to_input_dir фреймворка LightRAG, позволяющая нарушителю обойти ограничения безопасности

EPSS

Процентиль: 1%
0.00011
Низкий

4.8 Medium

CVSS4

5.3 Medium

CVSS3

Дефекты

CWE-22