Vulnerability Description
parisneo/lollms-webui is vulnerable to stored Cross-Site Scripting (XSS) that leads to Remote Code Execution (RCE). The vulnerability arises due to inadequate sanitization and validation of model output data, allowing an attacker to inject malicious JavaScript code. This code can be executed within the user's browser context, enabling the attacker to send a request to the `/execute_code` endpoint and establish a reverse shell to the attacker's host. The issue affects various components of the application, including the handling of user input and model output.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Lollms | Lollms Web Ui | 9.0 |
Related Weaknesses (CWE)
References
- https://huntr.com/bounties/59be0d5a-f18e-4418-8f29-72320269a097ExploitThird Party Advisory
- https://huntr.com/bounties/59be0d5a-f18e-4418-8f29-72320269a097ExploitThird Party Advisory
FAQ
What is CVE-2024-1602?
CVE-2024-1602 is a vulnerability with a CVSS score of 6.1 (MEDIUM). parisneo/lollms-webui is vulnerable to stored Cross-Site Scripting (XSS) that leads to Remote Code Execution (RCE). The vulnerability arises due to inadequate sanitization and validation of model outp...
How severe is CVE-2024-1602?
CVE-2024-1602 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-1602?
Check the references section above for vendor advisories and patch information. Affected products include: Lollms Lollms Web Ui.