First published: Thu Jun 06 2024(Updated: )
parisneo/lollms-webui is vulnerable to path traversal and denial of service attacks due to an exposed `/select_database` endpoint in version a9d16b0. The endpoint improperly handles file paths, allowing attackers to specify absolute paths when interacting with the `DiscussionsDB` instance. This flaw enables attackers to create directories anywhere on the system where the application has permissions, potentially leading to denial of service by creating directories with names of critical files, such as HTTPS certificate files, causing server startup failures. Additionally, attackers can manipulate the database path, resulting in the loss of client data by constantly changing the file location to an attacker-controlled location, scattering the data across the filesystem and making recovery difficult.
Credit: security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
Parisneo Lollms |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-1873 is classified as a high severity vulnerability due to the potential for path traversal and denial of service attacks.
To fix CVE-2024-1873, ensure that the `/select_database` endpoint properly sanitizes file paths and restricts input to avoid absolute paths.
CVE-2024-1873 impacts the Lollms Web UI application version a9d16b0.
CVE-2024-1873 can be exploited for path traversal and denial of service attacks.
There is currently no public information indicating that CVE-2024-1873 is being actively exploited in the wild.