2 results (0.004 seconds)

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

27 Jun 2024 — An absolute path traversal vulnerability exists in parisneo/lollms-webui v9.6, specifically in the `open_file` endpoint of `lollms_advanced.py`. The `sanitize_path` function with `allow_absolute_path=True` allows an attacker to access arbitrary files and directories on a Windows system. This vulnerability can be exploited to read any file and list arbitrary directories on the affected system. • https://huntr.com/bounties/11a8bf9d-16f3-49b3-b5fc-ad36d8993c73 • CWE-36: Absolute Path Traversal •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

06 Jun 2024 — A path traversal vulnerability exists in the parisneo/lollms-webui application, specifically within the `lollms_core/lollms/server/endpoints/lollms_binding_files_server.py` and `lollms_core/lollms/security.py` files. Due to inadequate validation of file paths between Windows and Linux environments using `Path(path).is_absolute()`, attackers can exploit this flaw to read any file on the system. This issue affects the latest version of LoLLMs running on the Windows platform. The vulnerability is triggered whe... • https://github.com/parisneo/lollms-webui/commit/49b0332e98d42dd5204dda53dee410b160106265 • CWE-36: Absolute Path Traversal •