Описание
A path traversal vulnerability exists in the parisneo/lollms-webui repository, specifically in the lollms_file_system.py file. The functions add_rag_database, toggle_mount_rag_database, and vectorize_folder do not implement security measures such as sanitize_path_from_endpoint or sanitize_path. This allows an attacker to perform vectorize operations on .sqlite files in any directory on the victim's computer, potentially installing multiple packages and causing a crash.
Ссылки
- ExploitThird Party Advisory
Уязвимые конфигурации
Конфигурация 1
cpe:2.3:a:lollms:lollms-webui:9.8:*:*:*:*:*:*:*
EPSS
Процентиль: 7%
0.00027
Низкий
3.4 Low
CVSS3
4.4 Medium
CVSS3
Дефекты
CWE-22
Связанные уязвимости
CVSS3: 3.4
github
больше 1 года назад
Lord of Large Language Models (LoLLMs) Server path traversal vulnerability in lollms_file_system.py
EPSS
Процентиль: 7%
0.00027
Низкий
3.4 Low
CVSS3
4.4 Medium
CVSS3
Дефекты
CWE-22