First published: Tue Oct 29 2024(Updated: )
A Cross-Site Request Forgery (CSRF) vulnerability exists in the `install_comfyui` endpoint of the `lollms_comfyui.py` file in the parisneo/lollms-webui repository, versions v9.9 to the latest. The endpoint uses the GET method without requiring a client ID, allowing an attacker to trick a victim into installing ComfyUI. If the victim's device does not have sufficient capacity, this can result in a crash.
Credit: security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
Parisneo Lollms | <10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-6673 is classified as a critical vulnerability due to its nature as a Cross-Site Request Forgery (CSRF), which can lead to unauthorized actions being performed on behalf of users.
To fix CVE-2024-6673, update to a version of the lollms_web_ui that addresses the vulnerability, and ensure that the install_comfyui endpoint requires proper authentication and uses the POST method.
CVE-2024-6673 affects versions v9.9 to the latest of the lollms_web_ui.
Exploiting CVE-2024-6673 allows attackers to perform unauthorized actions by crafting malicious requests without needing user credentials.
Yes, CVE-2024-6673 specifically affects the install_comfyui endpoint in the lollms_web_ui.