Vulnerability Description
A vulnerability in the `start_app_server` function of parisneo/lollms-webui V12 (Strawberry) allows for path traversal and OS command injection. The function does not properly sanitize the `app_name` parameter, enabling an attacker to upload a malicious `server.py` file and execute arbitrary code by exploiting the path traversal vulnerability.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Lollms | Lollms Web Ui | 12 |
Related Weaknesses (CWE)
References
- https://huntr.com/bounties/3cf80890-2d8a-4fc7-8e0e-6d4bf648b3eaExploitThird Party Advisory
FAQ
What is CVE-2024-10019?
CVE-2024-10019 is a vulnerability with a CVSS score of 6.7 (MEDIUM). A vulnerability in the `start_app_server` function of parisneo/lollms-webui V12 (Strawberry) allows for path traversal and OS command injection. The function does not properly sanitize the `app_name` ...
How severe is CVE-2024-10019?
CVE-2024-10019 has been rated MEDIUM with a CVSS base score of 6.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-10019?
Check the references section above for vendor advisories and patch information. Affected products include: Lollms Lollms Web Ui.