We found results for “”
CVE-2024-6250
Date: June 27, 2024
An absolute path traversal vulnerability exists in parisneo/lollms-webui v9.6, specifically in the "open_file" endpoint of "lollms_advanced.py". The "sanitize_path" function with "allow_absolute_path=True" allows an attacker to access arbitrary files and directories on a Windows system. This vulnerability can be exploited to read any file and list arbitrary directories on the affected system.
Language: Python
Severity Score
Severity Score
Weakness Type (CWE)
Absolute Path Traversal
CWE-36CVSS v3.1
| Base Score: |
|
|---|---|
| Attack Vector (AV): | NETWORK |
| Attack Complexity (AC): | LOW |
| Privileges Required (PR): | NONE |
| User Interaction (UI): | NONE |
| Scope (S): | UNCHANGED |
| Confidentiality (C): | HIGH |
| Integrity (I): | NONE |
| Availability (A): | NONE |
Vulnerabilities
Projects
Contact Us


