First published: Thu Jun 06 2024(Updated: )
A Server-Side Request Forgery (SSRF) vulnerability exists in the 'add_webpage' endpoint of the parisneo/lollms-webui application, affecting the latest version. The vulnerability arises because the application does not adequately validate URLs entered by users, allowing them to input arbitrary URLs, including those that target internal resources such as 'localhost' or '127.0.0.1'. This flaw enables attackers to make unauthorized requests to internal or external systems, potentially leading to access to sensitive data, service disruption, network integrity compromise, business logic manipulation, and abuse of third-party resources. The issue is critical and requires immediate attention to maintain the application's security and integrity.
Credit: security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
Parisneo Lollms |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-5482 is classified as a critical severity vulnerability due to its potential for exploitation through Server-Side Request Forgery.
To fix CVE-2024-5482, ensure that proper input validation is implemented on the URLs entered in the 'add_webpage' endpoint.
CVE-2024-5482 affects the Lollms Web UI application, specifically the parisneo/lollms-webui version.
Exploiting CVE-2024-5482 can allow an attacker to perform unauthorized actions and access internal resources through SSRF.
CVE-2024-5482 was reported recently and is present in the latest version of the affected software.