CVE-2024-6868

mudler/LocalAI version 2.17.1 allows for arbitrary file write due to improper handling of automatic archive extraction. When model configurations specify additional files as archives (e.g., .tar), these archives are automatically extracted after downloading. This behavior can be exploited to perform a 'tarslip' attack, allowing files to be written to arbitrary locations on the server, bypassing checks that normally restrict files to the models directory. This vulnerability can lead to remote code execution (RCE) by overwriting backend assets used by the server.
Configurations

Configuration 1 (hide)

cpe:2.3:a:mudler:localai:2.17.1:*:*:*:*:*:*:*

History

13 Nov 2024, 14:43

Type Values Removed Values Added
First Time Mudler
Mudler localai
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
CPE cpe:2.3:a:mudler:localai:2.17.1:*:*:*:*:*:*:*
References () https://huntr.com/bounties/752d2376-2d9a-4e17-b462-3c267f9dd229 - () https://huntr.com/bounties/752d2376-2d9a-4e17-b462-3c267f9dd229 - Exploit, Third Party Advisory
References () https://github.com/mudler/localai/commit/a181dd0ebc5d3092fc50f61674d552604fe8ef9c - () https://github.com/mudler/localai/commit/a181dd0ebc5d3092fc50f61674d552604fe8ef9c - Patch
CWE NVD-CWE-noinfo

29 Oct 2024, 13:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-10-29 13:15

Updated : 2024-11-13 14:43


NVD link : CVE-2024-6868

Mitre link : CVE-2024-6868


JSON object : View

Products Affected

mudler

  • localai