Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2024-9920

Опубликовано: 20 мар. 2025
Источник: nvd
CVSS3: 6.6
CVSS3: 8.8
EPSS Низкий

Описание

In version v12 of parisneo/lollms-webui, the 'Send file to AL' function allows uploading files with various extensions, including potentially dangerous ones like .py, .sh, .bat, and more. Attackers can exploit this by uploading files with malicious content and then using the '/open_file' API endpoint to execute these files. The vulnerability arises from the use of 'subprocess.Popen' to open files without proper validation, leading to potential remote code execution.

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:lollms:lollms_web_ui:12:*:*:*:*:*:*:*

EPSS

Процентиль: 75%
0.00891
Низкий

6.6 Medium

CVSS3

8.8 High

CVSS3

Дефекты

CWE-434
CWE-434

Связанные уязвимости

CVSS3: 6.6
github
11 месяцев назад

In version v12 of parisneo/lollms-webui, the 'Send file to AL' function allows uploading files with various extensions, including potentially dangerous ones like .py, .sh, .bat, and more. Attackers can exploit this by uploading files with malicious content and then using the '/open_file' API endpoint to execute these files. The vulnerability arises from the use of 'subprocess.Popen' to open files without proper validation, leading to potential remote code execution.

EPSS

Процентиль: 75%
0.00891
Низкий

6.6 Medium

CVSS3

8.8 High

CVSS3

Дефекты

CWE-434
CWE-434