Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-4322— Path Traversal in parisneo/lollms-webui

EPSS 12.37% · P94
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2024-4322

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Path Traversal in parisneo/lollms-webui
Source: NVD (National Vulnerability Database)
Vulnerability Description
A path traversal vulnerability exists in the parisneo/lollms-webui application, specifically within the `/list_personalities` endpoint. By manipulating the `category` parameter, an attacker can traverse the directory structure and list any directory on the system. This issue affects the latest version of the application. The vulnerability is due to improper handling of user-supplied input in the `list_personalities` function, where the `category` parameter can be controlled to specify arbitrary directories for listing. Successful exploitation of this vulnerability could allow an attacker to list all folders in the drive on the system, potentially leading to information disclosure.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
路径遍历:’..filename’
Source: NVD (National Vulnerability Database)
Vulnerability Title
LoLLMs 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
LoLLMs是Saifeddine ALOUI个人开发者的一个大型语言多模式系统的 Web UI。 LoLLMs 存在安全漏洞,该漏洞源于对 list_personalities 函数中用户提供的输入处理不当,允许攻击者遍历目录结构并列出系统上的任何目录。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
parisneoparisneo/lollms-webui unspecified ~ latest -

II. Public POCs for CVE-2024-4322

#POC DescriptionSource LinkShenlong Link
1parisneo/lollms-webui contains a path traversal caused by improper handling of 'category' parameter in /list_personalities endpoint, letting attackers list arbitrary directories, exploit requires control over 'category' parameter. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-4322.yamlPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2024-4322

登录查看更多情报信息。

Same Patch Batch · parisneo · 2024-05-16 · 8 CVEs total

CVE-2024-2361Arbitrary Upload & Read via Path Traversal in parisneo/lollms-webui
CVE-2024-2366Remote Code Execution in parisneo/lollms-webui
CVE-2024-2358Path Traversal leading to Remote Code Execution in parisneo/lollms-webui
CVE-2024-3126Command Injection in parisneo/lollms-webui
CVE-2024-3435Path Traversal in parisneo/lollms-webui
CVE-2024-4326Remote Code Execution via `/apply_settings` and `/execute_code` in parisneo/lollms-webui
CVE-2024-4078Arbitrary Code Execution in parisneo/lollms

IV. Related Vulnerabilities

V. Comments for CVE-2024-4322

No comments yet


Leave a comment