From a605ebfee5550298716a9db87aac231b43f79e78 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Sun, 23 Jun 2024 16:03:10 +0000 Subject: [PATCH] Auto-Update: 2024-06-23T16:00:18.033071+00:00 --- CVE-2024/CVE-2024-48xx/CVE-2024-4841.json | 55 +++++++++++++++++++++++ README.md | 8 ++-- _state.csv | 3 +- 3 files changed, 61 insertions(+), 5 deletions(-) create mode 100644 CVE-2024/CVE-2024-48xx/CVE-2024-4841.json diff --git a/CVE-2024/CVE-2024-48xx/CVE-2024-4841.json b/CVE-2024/CVE-2024-48xx/CVE-2024-4841.json new file mode 100644 index 00000000000..2109daa31c3 --- /dev/null +++ b/CVE-2024/CVE-2024-48xx/CVE-2024-4841.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-4841", + "sourceIdentifier": "security@huntr.dev", + "published": "2024-06-23T15:15:09.233", + "lastModified": "2024-06-23T15:15:09.233", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A Path Traversal vulnerability exists in the parisneo/lollms-webui, specifically within the 'add_reference_to_local_mode' function due to the lack of input sanitization. This vulnerability affects versions v9.6 to the latest. By exploiting this vulnerability, an attacker can predict the folders, subfolders, and files present on the victim's computer. The vulnerability is present in the way the application handles the 'path' parameter in HTTP requests to the '/add_reference_to_local_model' endpoint." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "security@huntr.dev", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.0, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security@huntr.dev", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-29" + } + ] + } + ], + "references": [ + { + "url": "https://huntr.com/bounties/740dda3e-7104-4ccf-9ac4-8870e4d6d602", + "source": "security@huntr.dev" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 1eef3f53f4a..d52c4b92018 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-06-23T14:00:18.234225+00:00 +2024-06-23T16:00:18.033071+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-06-23T12:15:09.710000+00:00 +2024-06-23T15:15:09.233000+00:00 ``` ### Last Data Feed Release @@ -33,14 +33,14 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -254957 +254958 ``` ### CVEs added in the last Commit Recently added CVEs: `1` -- [CVE-2024-6269](CVE-2024/CVE-2024-62xx/CVE-2024-6269.json) (`2024-06-23T12:15:09.710`) +- [CVE-2024-4841](CVE-2024/CVE-2024-48xx/CVE-2024-4841.json) (`2024-06-23T15:15:09.233`) ### CVEs modified in the last Commit diff --git a/_state.csv b/_state.csv index 747c246b668..bce9e300487 100644 --- a/_state.csv +++ b/_state.csv @@ -254192,6 +254192,7 @@ CVE-2024-4835,0,0,b9626bd6b7354ef649f3d482141bd2eedfd065e81dc3c11d391c7f577be028 CVE-2024-4837,0,0,67f132196b6c5804deb56deda048fcbd80dd9bcaa597012fb36064245b7ca6b6,2024-05-15T18:35:11.453000 CVE-2024-4838,0,0,213892fd4e00ded7d0e7161081f565f4e4fb5fc98a2507596b17757660a932b0,2024-05-16T13:03:05.353000 CVE-2024-4840,0,0,0433203d32cea74c83d368a573acbff4a265569f0c59cff4b7c2310b61ae299a,2024-05-14T16:11:39.510000 +CVE-2024-4841,1,1,79642fdffc683c6b0d04a13ce6417a60c387339808a5119462faf1e701444ffc,2024-06-23T15:15:09.233000 CVE-2024-4842,0,0,42725480e618d2e75cdf5b0a1412ffa80e3600e0a1a1d76c6fd07755cc858e7e,2024-05-30T20:15:09.703000 CVE-2024-4843,0,0,58cfe808f738fd9393d526b6ae9c349063459aa7046a90d478177ce3db0c98a6,2024-05-16T13:03:05.353000 CVE-2024-4844,0,0,9cc52c71da3e5a51bc8bac3549d843df2f9b393e878f774cc4555ff01bf8c6f2,2024-05-16T13:03:05.353000 @@ -254955,4 +254956,4 @@ CVE-2024-6253,0,0,36afe0470776b2066530d7f83b649e84a5bf248040996b76e07345297ebaaf CVE-2024-6266,0,0,70666cb36be680ae24e3b529873b2f76b9772ce56140af79219b2227eed230ed,2024-06-23T03:15:51.817000 CVE-2024-6267,0,0,9ee9d3ae56be6680575548576947e037de2c4b890a9205e4f9e207294729b9e2,2024-06-23T09:15:11.320000 CVE-2024-6268,0,0,d5f22f854a068a47453548a1178f4ed15437dffc736d923ed553c44b59a8eea7,2024-06-23T10:15:09.753000 -CVE-2024-6269,1,1,1e8f9e9c3bfd0a35fc5f3a43852838aac6176b60453f405532505e06c6623810,2024-06-23T12:15:09.710000 +CVE-2024-6269,0,0,1e8f9e9c3bfd0a35fc5f3a43852838aac6176b60453f405532505e06c6623810,2024-06-23T12:15:09.710000