Attacker Value
Unknown
(0 users assessed)
Exploitability
Unknown
(0 users assessed)
User Interaction
Unknown
Privileges Required
Unknown
Attack Vector
Unknown
0

CVE-2024-4498

Disclosure Date: June 25, 2024
Add MITRE ATT&CK tactics and techniques that apply to this CVE.

Description

A Path Traversal and Remote File Inclusion (RFI) vulnerability exists in the parisneo/lollms-webui application, affecting versions v9.7 to the latest. The vulnerability arises from insufficient input validation in the /apply_settings function, allowing an attacker to manipulate the discussion_db_name parameter to traverse the file system and include arbitrary files. This issue is compounded by the bypass of input filtering in the install_binding, reinstall_binding, and unInstall_binding endpoints, despite the presence of a sanitize_path_from_endpoint(data.name) filter. Successful exploitation enables an attacker to upload and execute malicious code on the victim’s system, leading to Remote Code Execution (RCE).

Add Assessment

No one has assessed this topic. Be the first to add your voice to the community.

CVSS V3 Severity and Metrics
Base Score:
None
Impact Score:
Unknown
Exploitability Score:
Unknown
Vector:
Unknown
Attack Vector (AV):
Unknown
Attack Complexity (AC):
Unknown
Privileges Required (PR):
Unknown
User Interaction (UI):
Unknown
Scope (S):
Unknown
Confidentiality (C):
Unknown
Integrity (I):
Unknown
Availability (A):
Unknown

General Information

Vendors

Additional Info

Technical Analysis