A path traversal vulnerability exists in the parisneo/lollms-webui, specifically within the 'copy_to_custom_personas' endpoint in the 'lollms_personalities_infos.py' file. This vulnerability allows attackers to read arbitrary files by manipulating the 'category' and 'name' parameters during the 'Copy to custom personas folder for editing' process. By inserting '../' sequences in these parameters, attackers can traverse the directory structure and access files outside of the intended directory. Successful exploitation results in unauthorized access to sensitive information.
References
Link | Resource |
---|---|
https://huntr.com/bounties/e585f1dd-a026-4419-8f42-5835e85fad9e | Exploit Third Party Advisory Issue Tracking Patch |
https://huntr.com/bounties/e585f1dd-a026-4419-8f42-5835e85fad9e | Exploit Third Party Advisory Issue Tracking Patch |
Configurations
History
09 Jul 2025, 14:25
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:lollms:lollms_web_ui:*:*:*:*:*:*:*:* | |
First Time |
Lollms lollms Web Ui
Lollms |
|
References | () https://huntr.com/bounties/e585f1dd-a026-4419-8f42-5835e85fad9e - Exploit, Third Party Advisory, Issue Tracking, Patch |
Information
Published : 2024-06-02 11:15
Updated : 2025-07-09 14:25
NVD link : CVE-2024-2178
Mitre link : CVE-2024-2178
CVE.ORG link : CVE-2024-2178
JSON object : View
Products Affected
lollms
- lollms_web_ui
CWE
CWE-29
Path Traversal: '\..\filename'