First published: Thu Jun 06 2024(Updated: )
A remote code execution (RCE) vulnerability exists in the '/install_extension' endpoint of the parisneo/lollms-webui application, specifically within the `@router.post("/install_extension")` route handler. The vulnerability arises due to improper handling of the `name` parameter in the `ExtensionBuilder().build_extension()` method, which allows for local file inclusion (LFI) leading to arbitrary code execution. An attacker can exploit this vulnerability by crafting a malicious `name` parameter that causes the server to load and execute a `__init__.py` file from an arbitrary location, such as the upload directory for discussions. This vulnerability affects the latest version of parisneo/lollms-webui and can lead to remote code execution without requiring user interaction, especially when the application is exposed to an external endpoint or operated in headless mode.
Credit: security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
Parisneo Lollms |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-4320 is a remote code execution vulnerability in the '/install_extension' endpoint of the parisneo/lollms-webui application due to improper handling of the 'name' parameter.
CVE-2024-4320 is considered a high severity vulnerability due to its potential to allow remote code execution.
To fix CVE-2024-4320, update the parisneo/lollms-webui application to the latest version that addresses this vulnerability.
Users of the parisneo/lollms-webui application are affected by CVE-2024-4320 if they are using a vulnerable version.
The potential impacts of CVE-2024-4320 include unauthorized remote code execution, which can lead to complete system compromise.