First published: Thu May 16 2024(Updated: )
A path traversal vulnerability exists in the parisneo/lollms-webui application, specifically within the `/list_personalities` endpoint. By manipulating the `category` parameter, an attacker can traverse the directory structure and list any directory on the system. This issue affects the latest version of the application. The vulnerability is due to improper handling of user-supplied input in the `list_personalities` function, where the `category` parameter can be controlled to specify arbitrary directories for listing. Successful exploitation of this vulnerability could allow an attacker to list all folders in the drive on the system, potentially leading to information disclosure.
Credit: security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
parisneo lollms |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-4322 is classified as a medium severity vulnerability due to its potential to expose sensitive information.
To fix CVE-2024-4322, validate and sanitize the input for the `category` parameter in the `/list_personalities` endpoint.
CVE-2024-4322 is a path traversal vulnerability that allows an attacker to access arbitrary files on the system.
CVE-2024-4322 affects the parisneo/lollms-webui application.
CVE-2024-4322 can allow attackers to list unauthorized directories, compromising the system's file structure.