Vulnerability Description
A remote code execution vulnerability exists in the create_conda_env function of the parisneo/lollms repository, version 5.9.0. The vulnerability arises from the use of shell=True in the subprocess.Popen function, which allows an attacker to inject arbitrary commands by manipulating the env_name and python_version parameters. This issue could lead to a serious security breach as demonstrated by the ability to execute the 'whoami' command among potentially other harmful commands.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Lollms | Lollms | 5.9.0 |
Related Weaknesses (CWE)
References
- https://huntr.com/bounties/db57c343-9b80-4c1c-9ab0-9eef92c9b27bExploitThird Party Advisory
- https://huntr.com/bounties/db57c343-9b80-4c1c-9ab0-9eef92c9b27bExploitThird Party Advisory
FAQ
What is CVE-2024-3121?
CVE-2024-3121 is a vulnerability with a CVSS score of 3.3 (LOW). A remote code execution vulnerability exists in the create_conda_env function of the parisneo/lollms repository, version 5.9.0. The vulnerability arises from the use of shell=True in the subprocess.Po...
How severe is CVE-2024-3121?
CVE-2024-3121 has been rated LOW with a CVSS base score of 3.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-3121?
Check the references section above for vendor advisories and patch information. Affected products include: Lollms Lollms.