Vulnerability Description
A path traversal vulnerability exists in the parisneo/lollms-webui repository, specifically in the `lollms_file_system.py` file. The functions `add_rag_database`, `toggle_mount_rag_database`, and `vectorize_folder` do not implement security measures such as `sanitize_path_from_endpoint` or `sanitize_path`. This allows an attacker to perform vectorize operations on `.sqlite` files in any directory on the victim's computer, potentially installing multiple packages and causing a crash.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Lollms | Lollms-Webui | 9.8 |
Related Weaknesses (CWE)
References
- https://huntr.com/bounties/fbfe7cd0-99fb-4305-bd07-8b573364109eExploitThird Party Advisory
FAQ
What is CVE-2024-6971?
CVE-2024-6971 is a vulnerability with a CVSS score of 4.4 (MEDIUM). A path traversal vulnerability exists in the parisneo/lollms-webui repository, specifically in the `lollms_file_system.py` file. The functions `add_rag_database`, `toggle_mount_rag_database`, and `vec...
How severe is CVE-2024-6971?
CVE-2024-6971 has been rated MEDIUM with a CVSS base score of 4.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-6971?
Check the references section above for vendor advisories and patch information. Affected products include: Lollms Lollms-Webui.