cve/2024/CVE-2024-5443.md

18 lines
1.4 KiB
Markdown
Raw Normal View History

2025-09-29 16:08:36 +00:00
### [CVE-2024-5443](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5443)
![](https://img.shields.io/static/v1?label=Product&message=parisneo%2Flollms&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=unspecified%3C%209.8%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-29%20Path%20Traversal%3A%20'%5C..%5Cfilename'&color=brighgreen)
### Description
CVE-2024-4320 describes a vulnerability in the parisneo/lollms software, specifically within the `ExtensionBuilder().build_extension()` function. The vulnerability arises from the `/mount_extension` endpoint, where a path traversal issue allows attackers to navigate beyond the intended directory structure. This is facilitated by the `data.category` and `data.folder` parameters accepting empty strings (`""`), which, due to inadequate input sanitization, can lead to the construction of a `package_path` that points to the root directory. Consequently, if an attacker can create a `config.yaml` file in a controllable path, this path can be appended to the `extensions` list and trigger the execution of `__init__.py` in the current directory, leading to remote code execution. The vulnerability affects versions up to 5.9.0, and has been addressed in version 9.8.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/nhienit2010/nhienit2010