CVE-2024-2366

A remote code execution vulnerability exists in the parisneo/lollms-webui application, specifically within the reinstall_binding functionality in lollms_core/lollms/server/endpoints/lollms_binding_infos.py of the latest version. The vulnerability arises due to insufficient path sanitization, allowing an attacker to exploit path traversal to navigate to arbitrary directories. By manipulating the binding_path to point to a controlled directory and uploading a malicious __init__.py file, an attacker can execute arbitrary code on the server.
Configurations

No configuration.

History

21 Nov 2024, 09:09

Type Values Removed Values Added
References () https://huntr.com/bounties/63266c77-408b-45ff-962c-8163db50a864 - () https://huntr.com/bounties/63266c77-408b-45ff-962c-8163db50a864 -
Summary
  • (es) Existe una vulnerabilidad de ejecución de código remoto en la aplicación parisneo/lollms-webui, específicamente dentro de la funcionalidad reinstall_binding en lollms_core/lollms/server/endpoints/lollms_binding_infos.py de la última versión. La vulnerabilidad surge debido a una desinfección de ruta insuficiente, lo que permite a un atacante aprovechar el path traversal para navegar a directorios arbitrarios. Al manipular binding_path para que apunte a un directorio controlado y cargar un archivo __init__.py malicioso, un atacante puede ejecutar código arbitrario en el servidor.

16 May 2024, 09:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-16 09:15

Updated : 2024-11-21 09:09


NVD link : CVE-2024-2366

Mitre link : CVE-2024-2366

CVE.ORG link : CVE-2024-2366


JSON object : View

Products Affected

No product.

CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')