First published: Thu Jun 27 2024(Updated: )
An absolute path traversal vulnerability exists in parisneo/lollms-webui v9.6, specifically in the `open_file` endpoint of `lollms_advanced.py`. The `sanitize_path` function with `allow_absolute_path=True` allows an attacker to access arbitrary files and directories on a Windows system. This vulnerability can be exploited to read any file and list arbitrary directories on the affected system.
Credit: security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
parisneo lollms |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-6250 has been rated as a high severity vulnerability due to its potential for remote file access.
To mitigate CVE-2024-6250, update to the latest version of parisneo/lollms-webui where this vulnerability has been patched.
CVE-2024-6250 affects the `open_file` endpoint in the `lollms_advanced.py` file of parisneo/lollms-webui version 9.6.
CVE-2024-6250 is classified as an absolute path traversal vulnerability.
Attackers can exploit CVE-2024-6250 by leveraging the `sanitize_path` function to access arbitrary files on a Windows system.