Логотип exploitDog
bind:CVE-2024-6085
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-6085

Количество 2

Количество 2

nvd логотип

CVE-2024-6085

больше 1 года назад

A path traversal vulnerability exists in the XTTS server included in the lollms package, version v9.6. This vulnerability arises from the ability to perform an unauthenticated root folder settings change. Although the read file endpoint is protected against path traversals, this protection can be bypassed by changing the root folder to '/'. This allows attackers to read arbitrary files on the system. Additionally, the output folders can be changed to write arbitrary audio files to any location on the system.

CVSS3: 8.6
EPSS: Низкий
github логотип

GHSA-9chm-m6x2-6fvc

больше 1 года назад

lollms vulnerable to path traversal due to unauthenticated root folder settings change

CVSS3: 8.6
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-6085

A path traversal vulnerability exists in the XTTS server included in the lollms package, version v9.6. This vulnerability arises from the ability to perform an unauthenticated root folder settings change. Although the read file endpoint is protected against path traversals, this protection can be bypassed by changing the root folder to '/'. This allows attackers to read arbitrary files on the system. Additionally, the output folders can be changed to write arbitrary audio files to any location on the system.

CVSS3: 8.6
0%
Низкий
больше 1 года назад
github логотип
GHSA-9chm-m6x2-6fvc

lollms vulnerable to path traversal due to unauthenticated root folder settings change

CVSS3: 8.6
0%
Низкий
больше 1 года назад

Уязвимостей на страницу