2024-06-12 20:03:11 +00:00

101 lines
3.6 KiB
JSON

{
"id": "CVE-2024-4328",
"sourceIdentifier": "security@huntr.dev",
"published": "2024-06-10T08:15:51.730",
"lastModified": "2024-06-12T19:33:00.527",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A Cross-Site Request Forgery (CSRF) vulnerability exists in the clear_personality_files_list function of the parisneo/lollms-webui v9.6. The vulnerability arises from the use of a GET request to clear personality files list, which lacks proper CSRF protection. This flaw allows attackers to trick users into performing actions without their consent, such as deleting important files on the system. The issue is present in the application's handling of requests, making it susceptible to CSRF attacks that could lead to unauthorized actions being performed on behalf of the user."
},
{
"lang": "es",
"value": "Existe una vulnerabilidad de Cross-Site Request Forgery (CSRF) en la funci\u00f3n clear_personality_files_list de parisneo/lollms-webui v9.6. La vulnerabilidad surge del uso de una solicitud GET para borrar la lista de archivos de personalidad, que carece de la protecci\u00f3n CSRF adecuada. Esta falla permite a los atacantes enga\u00f1ar a los usuarios para que realicen acciones sin su consentimiento, como eliminar archivos importantes del sistema. El problema est\u00e1 presente en el manejo de solicitudes por parte de la aplicaci\u00f3n, lo que la hace susceptible a ataques CSRF que podr\u00edan llevar a la realizaci\u00f3n de acciones no autorizadas en nombre del usuario."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
}
],
"cvssMetricV30": [
{
"source": "security@huntr.dev",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 4.0,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.5,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security@huntr.dev",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:parisneo:lollms_web_ui:9.6:*:*:*:*:*:*:*",
"matchCriteriaId": "525C477F-F133-44B9-A0BC-43C1080D35F1"
}
]
}
]
}
],
"references": [
{
"url": "https://huntr.com/bounties/0f4faadf-ebca-4ef8-9d8a-66dbd849c0f8",
"source": "security@huntr.dev",
"tags": [
"Exploit"
]
}
]
}