Логотип exploitDog
bind:CVE-2024-8060
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-8060

Количество 2

Количество 2

nvd логотип

CVE-2024-8060

11 месяцев назад

OpenWebUI version 0.3.0 contains a vulnerability in the audio API endpoint `/audio/api/v1/transcriptions` that allows for arbitrary file upload. The application performs insufficient validation on the `file.content_type` and allows user-controlled filenames, leading to a path traversal vulnerability. This can be exploited by an authenticated user to overwrite critical files within the Docker container, potentially leading to remote code execution as the root user.

CVSS3: 8.1
EPSS: Низкий
github логотип

GHSA-ff5c-56m7-vc75

11 месяцев назад

Open WebUI allows Remote Code Execution via Arbitrary File Upload to /audio/api/v1/transcriptions

CVSS3: 8.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-8060

OpenWebUI version 0.3.0 contains a vulnerability in the audio API endpoint `/audio/api/v1/transcriptions` that allows for arbitrary file upload. The application performs insufficient validation on the `file.content_type` and allows user-controlled filenames, leading to a path traversal vulnerability. This can be exploited by an authenticated user to overwrite critical files within the Docker container, potentially leading to remote code execution as the root user.

CVSS3: 8.1
1%
Низкий
11 месяцев назад
github логотип
GHSA-ff5c-56m7-vc75

Open WebUI allows Remote Code Execution via Arbitrary File Upload to /audio/api/v1/transcriptions

CVSS3: 8.1
1%
Низкий
11 месяцев назад

Уязвимостей на страницу