Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2026-5530

Опубликовано: 05 апр. 2026
Источник: redhat
CVSS3: 6.3
EPSS Низкий

Описание

A flaw has been found in Ollama up to 18.1. This issue affects some unknown processing of the file server/download.go of the component Model Pull API. Executing a manipulation can lead to server-side request forgery. The attack can be launched remotely. The vendor was contacted early about this disclosure but did not respond in any way.

A flaw was found in Ollama. A remote attacker can exploit this vulnerability by manipulating the Model Pull API's server/download.go file. This can lead to Server-Side Request Forgery (SSRF), allowing the attacker to force the server to make requests to arbitrary network locations.

Отчет

Moderate. A Server-Side Request Forgery (SSRF) flaw in Ollama's Model Pull API allows a remote attacker to manipulate the API, compelling the server to initiate requests to arbitrary network locations. This could facilitate unauthorized access to internal network resources or enable other network-based attacks.

Меры по смягчению последствий

To reduce exposure, restrict network access to the Ollama service. Configure firewall rules to limit inbound connections to the port used by Ollama (e.g., 11434) to only trusted clients or networks. This can prevent remote attackers from exploiting the Server-Side Request Forgery vulnerability. Applying firewall rules may require a service reload or restart to take effect and could impact legitimate service functionality if not configured carefully.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Ansible Automation Platform 2ansible-automation-platform-24/lightspeed-rhel8Fix deferred
Red Hat Ansible Automation Platform 2ansible-automation-platform-25/lightspeed-rhel8Fix deferred
Red Hat Ansible Automation Platform 2ansible-automation-platform-26/lightspeed-rhel9Fix deferred
Red Hat build of Debezium 3debezium-ai-embeddings-ollamaFix deferred
Red Hat build of Debezium 3langchain4j-ollamaFix deferred
Red Hat build of Debezium 3ollamaFix deferred
Red Hat JBoss Enterprise Application Platform 8ollamaFix deferred
Red Hat JBoss Enterprise Application Platform 8quarkus-langchain4j-ollamaFix deferred
Red Hat JBoss Enterprise Application Platform Expansion PackollamaFix deferred
Red Hat JBoss Enterprise Application Platform Expansion Packquarkus-langchain4j-ollamaFix deferred

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-918
https://bugzilla.redhat.com/show_bug.cgi?id=2455147ollama: Ollama: Server-Side Request Forgery via Model Pull API manipulation

EPSS

Процентиль: 9%
0.00032
Низкий

6.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.3
nvd
3 дня назад

A flaw has been found in Ollama up to 18.1. This issue affects some unknown processing of the file server/download.go of the component Model Pull API. Executing a manipulation can lead to server-side request forgery. The attack can be launched remotely. The vendor was contacted early about this disclosure but did not respond in any way.

CVSS3: 6.3
debian
3 дня назад

A flaw has been found in Ollama up to 18.1. This issue affects some un ...

CVSS3: 6.3
github
3 дня назад

A flaw has been found in Ollama up to 18.1. This issue affects some unknown processing of the file server/download.go of the component Model Pull API. Executing a manipulation can lead to server-side request forgery. The attack can be launched remotely. The vendor was contacted early about this disclosure but did not respond in any way.

EPSS

Процентиль: 9%
0.00032
Низкий

6.3 Medium

CVSS3