CVE-2024-6250
CVSS V2 None
CVSS V3 None
Description
An absolute path traversal vulnerability exists in parisneo/lollms-webui v9.6, specifically in the `open_file` endpoint of `lollms_advanced.py`. The `sanitize_path` function with `allow_absolute_path=True` allows an attacker to access arbitrary files and directories on a Windows system. This vulnerability can be exploited to read any file and list arbitrary directories on the affected system.
Overview
- CVE ID
- CVE-2024-6250
- Assigner
- @huntr_ai
- Vulnerability Status
- PUBLISHED
- Published Version
- 2024-06-27T18:41:41.259Z
- Last Modified Date
- 2024-06-27T18:41:41.259Z
Weakness Enumerations
References
Reference URL | Reference Tags |
---|---|
https://huntr.com/bounties/11a8bf9d-16f3-49b3-b5fc-ad36d8993c73 |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2024-6250 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6250 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2024-06-28 13:10:43 | Added to TrackCVE |