CVE-2024-3121
Remote Code Execution in create_conda_env function in parisneo/lollms
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
A remote code execution vulnerability exists in the create_conda_env function of the parisneo/lollms repository, version 5.9.0. The vulnerability arises from the use of shell=True in the subprocess.Popen function, which allows an attacker to inject arbitrary commands by manipulating the env_name and python_version parameters. This issue could lead to a serious security breach as demonstrated by the ability to execute the 'whoami' command among potentially other harmful commands.
Existe una vulnerabilidad de ejecución remota de código en la función create_conda_env del repositorio parisneo/lollms, versión 5.9.0. La vulnerabilidad surge del uso de shell=True en la función subprocess.Popen, que permite a un atacante inyectar comandos arbitrarios manipulando los parámetros env_name y python_version. Este problema podría provocar una grave violación de la seguridad, como lo demuestra la capacidad de ejecutar el comando "whoami" entre otros comandos potencialmente dañinos.
CVSS Scores
SSVC
- Decision:Attend
Timeline
- 2024-03-31 CVE Reserved
- 2024-06-13 First Exploit
- 2024-06-24 CVE Published
- 2024-08-01 CVE Updated
- 2024-09-14 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-94: Improper Control of Generation of Code ('Code Injection')
CAPEC
References (2)
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Lollms Search vendor "Lollms" | Lollms Search vendor "Lollms" for product "Lollms" | * | - |
Affected
| ||||||
Parisneo Search vendor "Parisneo" | Lollms Search vendor "Parisneo" for product "Lollms" | * | - |
Affected
|