path traversal vulnerability was identified in the parisneo/lollms-webui
Moderate severity
GitHub Reviewed
Published
Jun 2, 2024
to the GitHub Advisory Database
•
Updated Jun 2, 2024
Description
Published by the National Vulnerability Database
May 30, 2024
Published to the GitHub Advisory Database
Jun 2, 2024
Reviewed
Jun 2, 2024
Last updated
Jun 2, 2024
A path traversal vulnerability was identified in the parisneo/lollms-webui repository, specifically within version 9.6. The vulnerability arises due to improper handling of user-supplied input in the 'list_personalities' endpoint. By crafting a malicious HTTP request, an attacker can traverse the directory structure and view the contents of any folder, albeit limited to subfolder names only. This issue was demonstrated via a specific HTTP request that manipulated the 'category' parameter to access arbitrary directories. The vulnerability is present in the code located at the 'endpoints/lollms_advanced.py' file.
References