A path traversal vulnerability exists in the parisneo...
High severity
Unreviewed
Published
Jun 6, 2024
to the GitHub Advisory Database
•
Updated Oct 17, 2024
Description
Published by the National Vulnerability Database
Jun 6, 2024
Published to the GitHub Advisory Database
Jun 6, 2024
Last updated
Oct 17, 2024
A path traversal vulnerability exists in the parisneo/lollms-webui application, specifically within the
lollms_core/lollms/server/endpoints/lollms_binding_files_server.py
andlollms_core/lollms/security.py
files. Due to inadequate validation of file paths between Windows and Linux environments usingPath(path).is_absolute()
, attackers can exploit this flaw to read any file on the system. This issue affects the latest version of LoLLMs running on the Windows platform. The vulnerability is triggered when an attacker sends a specially crafted request to the/user_infos/{path:path}
endpoint, allowing the reading of arbitrary files, as demonstrated with thewin.ini
file. The issue has been addressed in version 9.5 of the software.References