Description

In open-webui version 0.3.8, the endpoint `/models/upload` is vulnerable to arbitrary file write due to improper handling of user-supplied filenames. The vulnerability arises from the usage of `file_path = f"{UPLOAD_DIR}/{file.filename}"` without proper input validation or sanitization. An attacker can exploit this by manipulating the `file.filename` parameter to include directory traversal sequences, causing the resulting `file_path` to escape the intended `UPLOAD_DIR` and potentially overwrite arbitrary files on the system. This can lead to unauthorized modifications of system binaries, configuration files, or sensitive data, potentially enabling remote command execution.

INFO

Published Date :

2025-03-20T10:10:48.964Z

Last Modified :

2025-03-20T18:16:14.120Z

Source :

@huntr_ai
AFFECTED PRODUCTS

The following products are affected by CVE-2024-7034 vulnerability.

Vendors Products
Open-webui
  • Open-webui
Openwebui
  • Open Webui
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2024-7034.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact
Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact