Description

A remote code execution (RCE) vulnerability exists in the parisneo/lollms-webui, specifically within the 'open_file' module, version 9.5. The vulnerability arises due to improper neutralization of special elements used in a command within the 'open_file' function. An attacker can exploit this vulnerability by crafting a malicious file path that, when processed by the 'open_file' function, executes arbitrary system commands or reads sensitive file content. This issue is present in the code where subprocess.Popen is used unsafely to open files based on user-supplied paths without adequate validation, leading to potential command injection.

INFO

Published Date :

2024-05-22T19:29:56.867Z

Last Modified :

2024-08-01T20:33:53.200Z

Source :

@huntr_ai
AFFECTED PRODUCTS

The following products are affected by CVE-2024-4267 vulnerability.

Vendors Products
Lollms
  • Lollms-webui
Parisneo
  • Lollms-webui
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2024-4267.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact
Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact