2024-12-08 03:06:42 +00:00

86 lines
3.8 KiB
JSON

{
"id": "CVE-2024-5125",
"sourceIdentifier": "security@huntr.dev",
"published": "2024-11-14T18:15:26.760",
"lastModified": "2024-11-15T16:35:09.290",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "parisneo/lollms-webui version 9.6 is vulnerable to Cross-Site Scripting (XSS) and Open Redirect due to inadequate input validation and processing of SVG files during the upload process. The XSS vulnerability allows attackers to embed malicious JavaScript code within SVG files, which is executed upon rendering, leading to potential credential theft and unauthorized data access. The Open Redirect vulnerability arises from insufficient URL validation within SVG files, enabling attackers to redirect users to malicious websites, thereby exposing them to phishing attacks, malware distribution, and reputation damage. These vulnerabilities are present in the application's functionality to send files to the AI module."
},
{
"lang": "es",
"value": "La versi\u00f3n 9.6 de parisneo/lollms-webui es vulnerable a Cross-Site Scripting (XSS) y Open Redirect debido a una validaci\u00f3n de entrada y un procesamiento inadecuados de los archivos SVG durante el proceso de carga. La vulnerabilidad XSS permite a los atacantes incrustar c\u00f3digo JavaScript malicioso en los archivos SVG, que se ejecuta al renderizarlos, lo que conduce a un posible robo de credenciales y acceso no autorizado a los datos. La vulnerabilidad Open Redirect surge de una validaci\u00f3n de URL insuficiente dentro de los archivos SVG, lo que permite a los atacantes redirigir a los usuarios a sitios web maliciosos, exponi\u00e9ndolos as\u00ed a ataques de phishing, distribuci\u00f3n de malware y da\u00f1os a la reputaci\u00f3n. Estas vulnerabilidades est\u00e1n presentes en la funcionalidad de la aplicaci\u00f3n para enviar archivos al m\u00f3dulo de IA."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:H",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.5
}
],
"cvssMetricV30": [
{
"source": "security@huntr.dev",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:H",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.5
}
]
},
"weaknesses": [
{
"source": "security@huntr.dev",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"references": [
{
"url": "https://github.com/parisneo/lollms-webui/commit/9b0f6c4ad1b9a2cd3466dcefaa278df30feed67e",
"source": "security@huntr.dev"
},
{
"url": "https://huntr.com/bounties/e6ae8cfd-9f8b-41df-a0cc-1e7a47416995",
"source": "security@huntr.dev"
}
]
}