Description
In open-webui version 0.3.8, the endpoint `/models/upload` is vulnerable to arbitrary file write due to improper handling of user-supplied filenames. The vulnerability arises from the usage of `file_path = f"{UPLOAD_DIR}/{file.filename}"` without proper input validation or sanitization. An attacker can exploit this by manipulating the `file.filename` parameter to include directory traversal sequences, causing the resulting `file_path` to escape the intended `UPLOAD_DIR` and potentially overwrite arbitrary files on the system. This can lead to unauthorized modifications of system binaries, configuration files, or sensitive data, potentially enabling remote command execution.
INFO
Published Date :
2025-03-20T10:10:48.964Z
Last Modified :
2025-03-20T18:16:14.120Z
Source :
@huntr_ai
AFFECTED PRODUCTS
The following products are affected by CVE-2024-7034 vulnerability.
| Vendors | Products |
|---|---|
| Open-webui |
|
| Openwebui |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2024-7034.