Show filters
61 Total Results
Displaying 1-10 of 61
Sort by:
Attacker Value
Unknown

CVE-2024-5125

Disclosure Date: November 14, 2024 (last updated November 15, 2024)
parisneo/lollms-webui version 9.6 is vulnerable to Cross-Site Scripting (XSS) and Open Redirect due to inadequate input validation and processing of SVG files during the upload process. The XSS vulnerability allows attackers to embed malicious JavaScript code within SVG files, which is executed upon rendering, leading to potential credential theft and unauthorized data access. The Open Redirect vulnerability arises from insufficient URL validation within SVG files, enabling attackers to redirect users to malicious websites, thereby exposing them to phishing attacks, malware distribution, and reputation damage. These vulnerabilities are present in the application's functionality to send files to the AI module.
0
Attacker Value
Unknown

CVE-2024-7049

Disclosure Date: October 10, 2024 (last updated October 18, 2024)
In version v0.3.8 of open-webui/open-webui, a vulnerability exists where a token is returned when a user with a pending role logs in. This allows the user to perform actions without admin confirmation, bypassing the intended approval process.
Attacker Value
Unknown

CVE-2024-7048

Disclosure Date: October 10, 2024 (last updated October 10, 2024)
In version v0.3.8 of open-webui, an improper privilege management vulnerability exists in the API endpoints GET /api/v1/documents/ and POST /rag/api/v1/doc. This vulnerability allows a lower-privileged user to access and overwrite files managed by a higher-privileged admin. By exploiting this vulnerability, an attacker can view metadata of files uploaded by an admin and overwrite these files, compromising the integrity and availability of the RAG models.
0
Attacker Value
Unknown

CVE-2024-7041

Disclosure Date: October 09, 2024 (last updated October 10, 2024)
An Insecure Direct Object Reference (IDOR) vulnerability exists in open-webui/open-webui version v0.3.8. The vulnerability occurs in the API endpoint `http://0.0.0.0:3000/api/v1/memories/{id}/update`, where the decentralization design is flawed, allowing attackers to edit other users' memories without proper authorization.
0
Attacker Value
Unknown

CVE-2024-7037

Disclosure Date: October 09, 2024 (last updated October 10, 2024)
In version v0.3.8 of open-webui/open-webui, the endpoint /api/pipelines/upload is vulnerable to arbitrary file write and delete due to unsanitized file.filename concatenation with CACHE_DIR. This vulnerability allows attackers to overwrite and delete system files, potentially leading to remote code execution.
0
Attacker Value
Unknown

CVE-2024-7038

Disclosure Date: October 09, 2024 (last updated October 16, 2024)
An information disclosure vulnerability exists in open-webui version 0.3.8. The vulnerability is related to the embedding model update feature under admin settings. When a user updates the model path, the system checks if the file exists and provides different error messages based on the existence and configuration of the file. This behavior allows an attacker to enumerate file names and traverse directories by observing the error messages, leading to potential exposure of sensitive information.
Attacker Value
Unknown

CVE-2024-6394

Disclosure Date: September 30, 2024 (last updated September 30, 2024)
A Local File Inclusion vulnerability exists in parisneo/lollms-webui versions below v9.8. The vulnerability is due to unverified path concatenation in the `serve_js` function in `app.py`, which allows attackers to perform path traversal attacks. This can lead to unauthorized access to arbitrary files on the server, potentially exposing sensitive information such as private SSH keys, configuration files, and source code.
0
Attacker Value
Unknown

CVE-2024-6707

Disclosure Date: August 07, 2024 (last updated August 09, 2024)
Attacker controlled files can be uploaded to arbitrary locations on the web server's filesystem by abusing a path traversal vulnerability.
Attacker Value
Unknown

CVE-2024-6706

Disclosure Date: August 07, 2024 (last updated August 09, 2024)
Attackers can craft a malicious prompt that coerces the language model into executing arbitrary JavaScript in the context of the web page.
Attacker Value
Unknown

CVE-2024-6040

Disclosure Date: August 01, 2024 (last updated August 02, 2024)
In parisneo/lollms-webui version v9.8, the lollms_binding_infos is missing the client_id parameter, which leads to multiple security vulnerabilities. Specifically, the endpoints /reload_binding, /install_binding, /reinstall_binding, /unInstall_binding, /set_active_binding_settings, and /update_binding_settings are susceptible to CSRF attacks and local attacks. An attacker can exploit this vulnerability to perform unauthorized actions on the victim's machine.
0