Логотип exploitDog
bind:CVE-2024-7033
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-7033

Количество 2

Количество 2

nvd логотип

CVE-2024-7033

11 месяцев назад

In version 0.3.8 of open-webui/open-webui, an arbitrary file write vulnerability exists in the download_model endpoint. When deployed on Windows, the application improperly handles file paths, allowing an attacker to manipulate the file path to write files to arbitrary locations on the server's filesystem. This can result in overwriting critical system or application files, causing denial of service, or potentially achieving remote code execution (RCE). RCE can allow an attacker to execute malicious code with the privileges of the user running the application, leading to a full system compromise.

CVSS3: 7.2
EPSS: Низкий
github логотип

GHSA-3p9q-7w63-3f8q

11 месяцев назад

Open WebUI Allows Arbitrary File Write via the `download_model` Endpoint

CVSS3: 6.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-7033

In version 0.3.8 of open-webui/open-webui, an arbitrary file write vulnerability exists in the download_model endpoint. When deployed on Windows, the application improperly handles file paths, allowing an attacker to manipulate the file path to write files to arbitrary locations on the server's filesystem. This can result in overwriting critical system or application files, causing denial of service, or potentially achieving remote code execution (RCE). RCE can allow an attacker to execute malicious code with the privileges of the user running the application, leading to a full system compromise.

CVSS3: 7.2
1%
Низкий
11 месяцев назад
github логотип
GHSA-3p9q-7w63-3f8q

Open WebUI Allows Arbitrary File Write via the `download_model` Endpoint

CVSS3: 6.5
1%
Низкий
11 месяцев назад

Уязвимостей на страницу