We found results for “”
CVE-2024-4326
Date: May 16, 2024
A vulnerability in parisneo/lollms-webui versions up to 9.3 allows remote attackers to execute arbitrary code. The vulnerability stems from insufficient protection of the "/apply_settings" and "/execute_code" endpoints. Attackers can bypass protections by setting the host to localhost, enabling code execution, and disabling code validation through the "/apply_settings" endpoint. Subsequently, arbitrary commands can be executed remotely via the "/execute_code" endpoint, exploiting the delay in settings enforcement. This issue was addressed in version 9.5.
Language: Python
Severity Score
Severity Score
Weakness Type (CWE)
External Control of System or Configuration Setting
CWE-15CVSS v3.1
| Base Score: |
|
|---|---|
| Attack Vector (AV): | NETWORK |
| Attack Complexity (AC): | LOW |
| Privileges Required (PR): | NONE |
| User Interaction (UI): | NONE |
| Scope (S): | UNCHANGED |
| Confidentiality (C): | HIGH |
| Integrity (I): | HIGH |
| Availability (A): | HIGH |
Vulnerabilities
Projects
Contact Us


