Vulnerability Description
A vulnerability in the discussion image upload function of the Lollms application, version v9.9, allows for the uploading of SVG files. Due to incomplete filtering in the sanitize_svg function, this can lead to cross-site scripting (XSS) vulnerabilities, which in turn pose a risk of remote code execution. The sanitize_svg function only removes script elements and 'on*' event attributes, but does not account for other potential vectors for XSS within SVG files. This vulnerability can be exploited when authorized users access a malicious URL containing the crafted SVG file.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Lollms | Lord Of Large Language Models | 9.9 |
Related Weaknesses (CWE)
References
- https://github.com/parisneo/lollms/commit/328b960a0de2097e13654ac752253e9541521dPatch
- https://huntr.com/bounties/ad68ecd6-44e2-449b-8e7e-f2b71b1b43c7ExploitThird Party Advisory
FAQ
What is CVE-2024-6581?
CVE-2024-6581 is a vulnerability with a CVSS score of 9.0 (CRITICAL). A vulnerability in the discussion image upload function of the Lollms application, version v9.9, allows for the uploading of SVG files. Due to incomplete filtering in the sanitize_svg function, this c...
How severe is CVE-2024-6581?
CVE-2024-6581 has been rated CRITICAL with a CVSS base score of 9.0/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2024-6581?
Check the references section above for vendor advisories and patch information. Affected products include: Lollms Lord Of Large Language Models.