First published: Thu Mar 20 2025(Updated: )
A remote code execution vulnerability exists in the Calculate function of parisneo/lollms version 9.8. The vulnerability arises from the use of Python's `eval()` function to evaluate mathematical expressions within a Python sandbox that disables `__builtins__` and only allows functions from the `math` module. This sandbox can be bypassed by loading the `os` module using the `_frozen_importlib.BuiltinImporter` class, allowing an attacker to execute arbitrary commands on the server. The issue is fixed in version 9.10.
Credit: security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
pip/lollms | <11.0.0 | 11.0.0 |
Parisneo Lollms Web UI | <9.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-6982 is rated as a high severity remote code execution vulnerability.
To fix CVE-2024-6982, upgrade to lollms version 11.0.0 or later.
CVE-2024-6982 is caused by the insecure use of Python's eval() function in the Calculate function of lollms.
CVE-2024-6982 affects lollms versions up to 9.10.
There are no known workarounds for CVE-2024-6982; updating to the patched version is recommended.