2024-07-14 02:06:08 +00:00

60 lines
2.7 KiB
JSON

{
"id": "CVE-2024-4839",
"sourceIdentifier": "security@huntr.dev",
"published": "2024-06-24T13:15:11.900",
"lastModified": "2024-06-24T19:26:47.037",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A Cross-Site Request Forgery (CSRF) vulnerability exists in the 'Servers Configurations' function of the parisneo/lollms-webui, versions 9.6 to the latest. The affected functions include Elastic search Service (under construction), XTTS service, Petals service, vLLM service, and Motion Ctrl service, which lack CSRF protection. This vulnerability allows attackers to deceive users into unwittingly installing the XTTS service among other packages by submitting a malicious installation request. Successful exploitation results in attackers tricking users into performing actions without their consent."
},
{
"lang": "es",
"value": "Existe una vulnerabilidad de Cross-Site Request Forgery (CSRF) en la funci\u00f3n 'Configuraciones de servidores' de parisneo/lollms-webui, versiones 9.6 a la \u00faltima. Las funciones afectadas incluyen el servicio de b\u00fasqueda el\u00e1stica (en construcci\u00f3n), el servicio XTTS, el servicio Petals, el servicio vLLM y el servicio Motion Ctrl, que carecen de protecci\u00f3n CSRF. Esta vulnerabilidad permite a los atacantes enga\u00f1ar a los usuarios para que instalen involuntariamente el servicio XTTS entre otros paquetes enviando una solicitud de instalaci\u00f3n maliciosa. La explotaci\u00f3n exitosa da como resultado que los atacantes enga\u00f1en a los usuarios para que realicen acciones sin su consentimiento."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "security@huntr.dev",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 4.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "security@huntr.dev",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://huntr.com/bounties/dcfc5a07-0427-42b5-a623-8d943873d7ff",
"source": "security@huntr.dev"
}
]
}