A path traversal vulnerability exists in the parisneo/lollms-webui application, specifically within the `lollms_core/lollms/server/endpoints/lollms_binding_files_server.py` and `lollms_core/lollms/security.py` files. Due to inadequate validation of file paths between Windows and Linux environments using `Path(path).is_absolute()`, attackers can exploit this flaw to read any file on the system. This issue affects the latest version of LoLLMs running on the Windows platform. The vulnerability is triggered when an attacker sends a specially crafted request to the `/user_infos/{path:path}` endpoint, allowing the reading of arbitrary files, as demonstrated with the `win.ini` file. The issue has been addressed in version 9.5 of the software.
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: @huntr_ai

Published: 2024-06-06T18:08:15.065Z

Updated: 2024-06-07T19:35:13.160Z

Reserved: 2024-03-15T21:59:38.552Z


Link: CVE-2024-2548

JSON object: View

cve-icon NVD Information

Status : Awaiting Analysis

Published: 2024-06-06T19:15:55.217

Modified: 2024-06-07T14:56:05.647


Link: CVE-2024-2548

JSON object: View

cve-icon Redhat Information

No data.

CWE