2024-12-08 03:06:42 +00:00

64 lines
3.0 KiB
JSON

{
"id": "CVE-2024-4322",
"sourceIdentifier": "security@huntr.dev",
"published": "2024-05-16T09:15:16.613",
"lastModified": "2024-11-21T09:42:37.400",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A path traversal vulnerability exists in the parisneo/lollms-webui application, specifically within the `/list_personalities` endpoint. By manipulating the `category` parameter, an attacker can traverse the directory structure and list any directory on the system. This issue affects the latest version of the application. The vulnerability is due to improper handling of user-supplied input in the `list_personalities` function, where the `category` parameter can be controlled to specify arbitrary directories for listing. Successful exploitation of this vulnerability could allow an attacker to list all folders in the drive on the system, potentially leading to information disclosure."
},
{
"lang": "es",
"value": "Existe una vulnerabilidad de path traversal en la aplicaci\u00f3n parisneo/lollms-webui, espec\u00edficamente dentro del endpoint `/list_personalities`. Al manipular el par\u00e1metro \"categor\u00eda\", un atacante puede atravesar la estructura del directorio y enumerar cualquier directorio del sistema. Este problema afecta a la \u00faltima versi\u00f3n de la aplicaci\u00f3n. La vulnerabilidad se debe al manejo inadecuado de la entrada proporcionada por el usuario en la funci\u00f3n `list_personalities`, donde el par\u00e1metro `category` se puede controlar para especificar directorios arbitrarios para listar. La explotaci\u00f3n exitosa de esta vulnerabilidad podr\u00eda permitir a un atacante enumerar todas las carpetas en la unidad del sistema, lo que podr\u00eda conducir a la divulgaci\u00f3n de informaci\u00f3n."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "security@huntr.dev",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security@huntr.dev",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-29"
}
]
}
],
"references": [
{
"url": "https://huntr.com/bounties/5116d858-ce00-418c-a5a5-851c5608c209",
"source": "security@huntr.dev"
},
{
"url": "https://huntr.com/bounties/5116d858-ce00-418c-a5a5-851c5608c209",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}