A remote code execution (RCE) vulnerability exists in the '/install_extension' endpoint of the parisneo/lollms-webui application, specifically within the `@router.post("/install_extension")` route handler. The vulnerability arises due to improper handling of the `name` parameter in the `ExtensionBuilder().build_extension()` method, which allows for local file inclusion (LFI) leading to arbitrary code execution. An attacker can exploit this vulnerability by crafting a malicious `name` parameter that causes the server to load and execute a `__init__.py` file from an arbitrary location, such as the upload directory for discussions. This vulnerability affects the latest version of parisneo/lollms-webui and can lead to remote code execution without requiring user interaction, especially when the application is exposed to an external endpoint or operated in headless mode.
References
| Link | Resource |
|---|---|
| https://huntr.com/bounties/d6564f04-0f59-4686-beb2-11659342279b | Exploit Third Party Advisory |
| https://huntr.com/bounties/d6564f04-0f59-4686-beb2-11659342279b | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 09:42
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://huntr.com/bounties/d6564f04-0f59-4686-beb2-11659342279b - Exploit, Third Party Advisory |
17 Oct 2024, 20:05
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://huntr.com/bounties/d6564f04-0f59-4686-beb2-11659342279b - Exploit, Third Party Advisory | |
| CPE | cpe:2.3:a:lollms:lollms_web_ui:-:*:*:*:*:*:*:* | |
| First Time |
Lollms lollms Web Ui
Lollms |
|
| CWE | CWE-22 |
07 Jun 2024, 14:56
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
06 Jun 2024, 19:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-06-06 19:16
Updated : 2024-11-21 09:42
NVD link : CVE-2024-4320
Mitre link : CVE-2024-4320
CVE.ORG link : CVE-2024-4320
JSON object : View
Products Affected
lollms
- lollms_web_ui
