Vulnerability Description
A Cross-Site Request Forgery (CSRF) vulnerability exists in the `install_comfyui` endpoint of the `lollms_comfyui.py` file in the parisneo/lollms-webui repository, versions v9.9 to the latest. The endpoint uses the GET method without requiring a client ID, allowing an attacker to trick a victim into installing ComfyUI. If the victim's device does not have sufficient capacity, this can result in a crash.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Lollms | Lollms Web Ui | < 10 |
Related Weaknesses (CWE)
References
- https://github.com/parisneo/lollms-webui/commit/c1bb1ad19752aa7541675b398495eaf9Patch
- https://huntr.com/bounties/a38f9a7d-b357-427d-adac-f9654d8c0e3cExploitThird Party Advisory
FAQ
What is CVE-2024-6673?
CVE-2024-6673 is a vulnerability with a CVSS score of 6.5 (MEDIUM). A Cross-Site Request Forgery (CSRF) vulnerability exists in the `install_comfyui` endpoint of the `lollms_comfyui.py` file in the parisneo/lollms-webui repository, versions v9.9 to the latest. The end...
How severe is CVE-2024-6673?
CVE-2024-6673 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-6673?
Check the references section above for vendor advisories and patch information. Affected products include: Lollms Lollms Web Ui.