Vulnerability Description
A remote code execution vulnerability exists in the parisneo/lollms-webui application, specifically within the reinstall_binding functionality in lollms_core/lollms/server/endpoints/lollms_binding_infos.py of the latest version. The vulnerability arises due to insufficient path sanitization, allowing an attacker to exploit path traversal to navigate to arbitrary directories. By manipulating the binding_path to point to a controlled directory and uploading a malicious __init__.py file, an attacker can execute arbitrary code on the server.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Lollms | Lollms Web Ui | < 9.5 |
Related Weaknesses (CWE)
References
- https://huntr.com/bounties/63266c77-408b-45ff-962c-8163db50a864ExploitIssue TrackingPatch
- https://huntr.com/bounties/63266c77-408b-45ff-962c-8163db50a864ExploitIssue TrackingPatch
FAQ
What is CVE-2024-2366?
CVE-2024-2366 is a vulnerability with a CVSS score of 9.0 (CRITICAL). A remote code execution vulnerability exists in the parisneo/lollms-webui application, specifically within the reinstall_binding functionality in lollms_core/lollms/server/endpoints/lollms_binding_inf...
How severe is CVE-2024-2366?
CVE-2024-2366 has been rated CRITICAL with a CVSS base score of 9.0/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2024-2366?
Check the references section above for vendor advisories and patch information. Affected products include: Lollms Lollms Web Ui.