2024-12-15 03:03:56 +00:00

111 lines
3.5 KiB
JSON

{
"id": "CVE-2024-6673",
"sourceIdentifier": "security@huntr.dev",
"published": "2024-10-29T13:15:08.040",
"lastModified": "2024-11-01T20:37:28.277",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A Cross-Site Request Forgery (CSRF) vulnerability exists in the `install_comfyui` endpoint of the `lollms_comfyui.py` file in the parisneo/lollms-webui repository, versions v9.9 to the latest. The endpoint uses the GET method without requiring a client ID, allowing an attacker to trick a victim into installing ComfyUI. If the victim's device does not have sufficient capacity, this can result in a crash."
},
{
"lang": "es",
"value": " Existe una vulnerabilidad de Cross-Site Request Forgery (CSRF) en el endpoint `install_comfyui` del archivo `lollms_comfyui.py` en el repositorio parisneo/lollms-webui, versiones v9.9 hasta la m\u00e1s reciente. El endpoint utiliza el m\u00e9todo GET sin requerir un ID de cliente, lo que permite a un atacante enga\u00f1ar a una v\u00edctima para que instale ComfyUI. Si el dispositivo de la v\u00edctima no tiene suficiente capacidad, esto puede provocar un bloqueo."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
],
"cvssMetricV30": [
{
"source": "security@huntr.dev",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 1.8,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "security@huntr.dev",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:lollms:lollms_web_ui:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10",
"matchCriteriaId": "C9971C52-7ED0-45BB-9D8E-7B5BB950F1A0"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/parisneo/lollms-webui/commit/c1bb1ad19752aa7541675b398495eaf98fd589f1",
"source": "security@huntr.dev",
"tags": [
"Patch"
]
},
{
"url": "https://huntr.com/bounties/a38f9a7d-b357-427d-adac-f9654d8c0e3c",
"source": "security@huntr.dev",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}