// For flags

CVE-2024-3429

Path Traversal in parisneo/lollms

Severity Score

9.8
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Attend
*SSVC
Descriptions

A path traversal vulnerability exists in the parisneo/lollms application, specifically within the `sanitize_path_from_endpoint` and `sanitize_path` functions in `lollms_core\lollms\security.py`. This vulnerability allows for arbitrary file reading when the application is running on Windows. The issue arises due to insufficient sanitization of user-supplied input, enabling attackers to bypass the path traversal protection mechanisms by crafting malicious input. Successful exploitation could lead to unauthorized access to sensitive files, information disclosure, and potentially a denial of service (DoS) condition by including numerous large or resource-intensive files. This vulnerability affects the latest version prior to 9.6.

Existe una vulnerabilidad de path traversal en la aplicación parisneo/lollms, específicamente dentro de las funciones `sanitize_path_from_endpoint` y `sanitize_path` en `lollms_core\lollms\security.py`. Esta vulnerabilidad permite la lectura arbitraria de archivos cuando la aplicación se ejecuta en Windows. El problema surge debido a una sanitización insuficiente de la entrada proporcionada por el usuario, lo que permite a los atacantes eludir los mecanismos de protección de path traversal mediante la creación de entradas maliciosas. Una explotación exitosa podría dar lugar a acceso no autorizado a archivos confidenciales, divulgación de información y, potencialmente, una condición de denegación de servicio (DoS) al incluir numerosos archivos grandes o que consumen muchos recursos. Esta vulnerabilidad afecta a la última versión anterior a la 9.6.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:Attend
Exploitation
Poc
Automatable
Yes
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2024-04-06 CVE Reserved
  • 2024-06-06 CVE Published
  • 2024-08-01 CVE Updated
  • 2024-12-17 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-29: Path Traversal: '\..\filename'
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Lollms
Search vendor "Lollms"
Lollms
Search vendor "Lollms" for product "Lollms"
*-
Affected
Parisneo
Search vendor "Parisneo"
Lollms-webui
Search vendor "Parisneo" for product "Lollms-webui"
*-
Affected