First published: Thu Jun 06 2024(Updated: )
A path traversal vulnerability exists in the parisneo/lollms-webui version 9.3 on the Windows platform. Due to improper validation of file paths between Windows and Linux environments, an attacker can exploit this vulnerability to delete any file on the system. The issue arises from the lack of adequate sanitization of user-supplied input in the 'del_preset' endpoint, where the application fails to prevent the use of absolute paths or directory traversal sequences ('..'). As a result, an attacker can send a specially crafted request to the 'del_preset' endpoint to delete files outside of the intended directory.
Credit: security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Lollms | =9.3 | |
Any of | ||
Linux Kernel | ||
Microsoft Windows Operating System |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-2362 has a high severity rating due to its potential to allow an attacker to delete arbitrary files from the system.
To fix CVE-2024-2362, upgrade Lollms Web UI to version 9.4 or later where the path traversal vulnerability is addressed.
CVE-2024-2362 affects Lollms Web UI version 9.3 on both Windows and Linux platforms.
CVE-2024-2362 is a path traversal vulnerability that allows unauthorized file deletions.
Yes, CVE-2024-2362 can be exploited by remote attackers if they can interact with the affected application.