First published: Thu May 16 2024(Updated: )
A command injection vulnerability exists in the 'run_xtts_api_server' function of the parisneo/lollms-webui application, specifically within the 'lollms_xtts.py' script. The vulnerability arises due to the improper neutralization of special elements used in an OS command. The affected function utilizes 'subprocess.Popen' to execute a command constructed with a Python f-string, without adequately sanitizing the 'xtts_base_url' input. This flaw allows attackers to execute arbitrary commands remotely by manipulating the 'xtts_base_url' parameter. The vulnerability affects versions up to and including the latest version before 9.5. Successful exploitation could lead to arbitrary remote code execution (RCE) on the system where the application is deployed.
Credit: security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
parisneo lollms | <=9.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-3126 is classified as a high severity command injection vulnerability.
To mitigate CVE-2024-3126, update the parisneo/lollms-webui application to version 9.6 or later.
Users of the parisneo/lollms-webui application version 9.5 and below are affected by CVE-2024-3126.
CVE-2024-3126 is a command injection vulnerability that allows attackers to execute arbitrary commands on the server.
More information about CVE-2024-3126 can be found in the official MITRE database and on GitHub.