// For flags

CVE-2024-5443

Remote Code Execution via Path Traversal in parisneo/lollms

Severity Score

9.8
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Attend
*SSVC
Descriptions

CVE-2024-4320 describes a vulnerability in the parisneo/lollms software, specifically within the `ExtensionBuilder().build_extension()` function. The vulnerability arises from the `/mount_extension` endpoint, where a path traversal issue allows attackers to navigate beyond the intended directory structure. This is facilitated by the `data.category` and `data.folder` parameters accepting empty strings (`""`), which, due to inadequate input sanitization, can lead to the construction of a `package_path` that points to the root directory. Consequently, if an attacker can create a `config.yaml` file in a controllable path, this path can be appended to the `extensions` list and trigger the execution of `__init__.py` in the current directory, leading to remote code execution. The vulnerability affects versions up to 5.9.0, and has been addressed in version 9.8.

CVE-2024-4320 describe una vulnerabilidad en el software parisneo/lollms, específicamente dentro de la función `ExtensionBuilder().build_extension()`. La vulnerabilidad surge del endpoint `/mount_extension`, donde un problema de path traversal permite a los atacantes navegar más allá de la estructura de directorios prevista. Esto se ve facilitado por los parámetros `data.category` y `data.folder` que aceptan cadenas vacías (`""`), lo que, debido a una sanitización de entrada inadecuada, puede conducir a la construcción de un `package_path` que apunte al directorio raíz. En consecuencia, si un atacante puede crear un archivo `config.yaml` en una ruta controlable, esta ruta puede agregarse a la lista de `extensiones` y desencadenar la ejecución de `__init__.py` en el directorio actual, lo que lleva a la ejecución remota de código. La vulnerabilidad afecta a las versiones hasta la 5.9.0 y se solucionó en la versión 9.8.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:Attend
Exploitation
Poc
Automatable
Yes
Tech. Impact
Total
* Organization's Worst-case Scenario
Timeline
  • 2024-05-28 CVE Reserved
  • 2024-06-22 CVE Published
  • 2024-06-23 EPSS Updated
  • 2024-08-01 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-29: Path Traversal: '\..\filename'
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Parisneo
Search vendor "Parisneo"
Lollms
Search vendor "Parisneo" for product "Lollms"
*-
Affected