Логотип exploitDog
bind:CVE-2024-7034
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-7034

Количество 2

Количество 2

nvd логотип

CVE-2024-7034

11 месяцев назад

In open-webui version 0.3.8, the endpoint `/models/upload` is vulnerable to arbitrary file write due to improper handling of user-supplied filenames. The vulnerability arises from the usage of `file_path = f"{UPLOAD_DIR}/{file.filename}"` without proper input validation or sanitization. An attacker can exploit this by manipulating the `file.filename` parameter to include directory traversal sequences, causing the resulting `file_path` to escape the intended `UPLOAD_DIR` and potentially overwrite arbitrary files on the system. This can lead to unauthorized modifications of system binaries, configuration files, or sensitive data, potentially enabling remote command execution.

CVSS3: 7.2
EPSS: Низкий
github логотип

GHSA-crh6-pj8c-xrhc

11 месяцев назад

Open WebUI Allows Arbitrary File Write via the `/models/upload` Endpoint

CVSS3: 6.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-7034

In open-webui version 0.3.8, the endpoint `/models/upload` is vulnerable to arbitrary file write due to improper handling of user-supplied filenames. The vulnerability arises from the usage of `file_path = f"{UPLOAD_DIR}/{file.filename}"` without proper input validation or sanitization. An attacker can exploit this by manipulating the `file.filename` parameter to include directory traversal sequences, causing the resulting `file_path` to escape the intended `UPLOAD_DIR` and potentially overwrite arbitrary files on the system. This can lead to unauthorized modifications of system binaries, configuration files, or sensitive data, potentially enabling remote command execution.

CVSS3: 7.2
3%
Низкий
11 месяцев назад
github логотип
GHSA-crh6-pj8c-xrhc

Open WebUI Allows Arbitrary File Write via the `/models/upload` Endpoint

CVSS3: 6.5
3%
Низкий
11 месяцев назад

Уязвимостей на страницу