CVE-2024-1873

parisneo/lollms-webui is vulnerable to path traversal and denial of service attacks due to an exposed `/select_database` endpoint in version a9d16b0. The endpoint improperly handles file paths, allowing attackers to specify absolute paths when interacting with the `DiscussionsDB` instance. This flaw enables attackers to create directories anywhere on the system where the application has permissions, potentially leading to denial of service by creating directories with names of critical files, such as HTTPS certificate files, causing server startup failures. Additionally, attackers can manipulate the database path, resulting in the loss of client data by constantly changing the file location to an attacker-controlled location, scattering the data across the filesystem and making recovery difficult.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:lollms:lollms_web_ui:-:*:*:*:*:*:*:*

History

15 Oct 2024, 19:14

Type Values Removed Values Added
CWE CWE-749 NVD-CWE-Other
CPE cpe:2.3:a:lollms:lollms_web_ui:-:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.1
References () https://huntr.com/bounties/c1cfc0d9-517a-4d0e-bf1c-6444c1fd195d - () https://huntr.com/bounties/c1cfc0d9-517a-4d0e-bf1c-6444c1fd195d - Third Party Advisory
First Time Lollms
Lollms lollms Web Ui

06 Jun 2024, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-06 19:15

Updated : 2024-10-15 19:14


NVD link : CVE-2024-1873

Mitre link : CVE-2024-1873


JSON object : View

Products Affected

lollms

  • lollms_web_ui