Vulnerability Description
A path traversal vulnerability exists in the XTTS server included in the lollms package, version v9.6. This vulnerability arises from the ability to perform an unauthenticated root folder settings change. Although the read file endpoint is protected against path traversals, this protection can be bypassed by changing the root folder to '/'. This allows attackers to read arbitrary files on the system. Additionally, the output folders can be changed to write arbitrary audio files to any location on the system.
CVSS Score
HIGH
Related Weaknesses (CWE)
References
- https://huntr.com/bounties/d2fb73d7-4b4f-451a-8763-484c189a27fe
- https://huntr.com/bounties/d2fb73d7-4b4f-451a-8763-484c189a27fe
FAQ
What is CVE-2024-6085?
CVE-2024-6085 is a vulnerability with a CVSS score of 8.6 (HIGH). A path traversal vulnerability exists in the XTTS server included in the lollms package, version v9.6. This vulnerability arises from the ability to perform an unauthenticated root folder settings cha...
How severe is CVE-2024-6085?
CVE-2024-6085 has been rated HIGH with a CVSS base score of 8.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-6085?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.