A path traversal vulnerability was identified in the parisneo/lollms-webui repository, specifically within version 9.6. The vulnerability arises due to improper handling of user-supplied input in the 'list_personalities' endpoint. By crafting a malicious HTTP request, an attacker can traverse the directory structure and view the contents of any folder, albeit limited to subfolder names only. This issue was demonstrated via a specific HTTP request that manipulated the 'category' parameter to access arbitrary directories. The vulnerability is present in the code located at the 'endpoints/lollms_advanced.py' file.
References
Link | Resource |
---|---|
https://huntr.com/bounties/154a78d5-3960-4fc6-8666-f982b5e70ed7 | Exploit Third Party Advisory Issue Tracking Patch |
https://huntr.com/bounties/154a78d5-3960-4fc6-8666-f982b5e70ed7 | Exploit Third Party Advisory Issue Tracking Patch |
Configurations
History
09 Jul 2025, 14:27
Type | Values Removed | Values Added |
---|---|---|
First Time |
Lollms lollms Web Ui
Lollms |
|
References | () https://huntr.com/bounties/154a78d5-3960-4fc6-8666-f982b5e70ed7 - Exploit, Third Party Advisory, Issue Tracking, Patch | |
CPE | cpe:2.3:a:lollms:lollms_web_ui:*:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 3.3 |
Information
Published : 2024-05-30 15:15
Updated : 2025-07-09 14:27
NVD link : CVE-2024-4330
Mitre link : CVE-2024-4330
CVE.ORG link : CVE-2024-4330
JSON object : View
Products Affected
lollms
- lollms_web_ui
CWE
CWE-23
Relative Path Traversal