First published: Thu May 16 2024(Updated: )
A remote code execution vulnerability exists in the parisneo/lollms-webui application, specifically within the reinstall_binding functionality in lollms_core/lollms/server/endpoints/lollms_binding_infos.py of the latest version. The vulnerability arises due to insufficient path sanitization, allowing an attacker to exploit path traversal to navigate to arbitrary directories. By manipulating the binding_path to point to a controlled directory and uploading a malicious __init__.py file, an attacker can execute arbitrary code on the server.
Credit: security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
parisneo lollms |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-2366 is classified as a remote code execution vulnerability, which is considered critical due to its potential for allowing unauthorized access and control.
To mitigate CVE-2024-2366, update the parisneo/lollms-webui application to the latest version where the vulnerability has been patched.
CVE-2024-2366 is caused by insufficient path sanitization in the reinstall_binding functionality of the lollms-webui application.
All users and systems running the parisneo/lollms-webui application are affected by CVE-2024-2366.
To assess vulnerability to CVE-2024-2366, check if your version of the parisneo/lollms-webui application contains the reinstall_binding functionality without the recent security updates.