
We found results for “”
CVE-2024-12766
Date: March 20, 2025
parisneo/lollms-webui version V13 (feather) suffers from a Server-Side Request Forgery (SSRF) vulnerability in the "POST /api/proxy" REST API. Attackers can exploit this vulnerability to abuse the victim server's credentials to access unauthorized web resources by specifying the JSON parameter "{"url":"http://steal.target"}". Existing security mechanisms such as "forbid_remote_access(lollmsElfServer)", "lollmsElfServer.config.headless_server_mode", and "check_access(lollmsElfServer, request.client_id)" do not protect against this vulnerability.
Severity Score
Severity Score
Weakness Type (CWE)
Server-Side Request Forgery (SSRF)
CWE-918CVSS v3.1
Base Score: |
|
---|---|
Attack Vector (AV): | NETWORK |
Attack Complexity (AC): | LOW |
Privileges Required (PR): | NONE |
User Interaction (UI): | NONE |
Scope (S): | UNCHANGED |
Confidentiality (C): | HIGH |
Integrity (I): | NONE |
Availability (A): | NONE |