We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-5482

SSRF in add_webpage endpoint in parisneo/lollms-webui



Description

A Server-Side Request Forgery (SSRF) vulnerability exists in the 'add_webpage' endpoint of the parisneo/lollms-webui application, affecting the latest version. The vulnerability arises because the application does not adequately validate URLs entered by users, allowing them to input arbitrary URLs, including those that target internal resources such as 'localhost' or '127.0.0.1'. This flaw enables attackers to make unauthorized requests to internal or external systems, potentially leading to access to sensitive data, service disruption, network integrity compromise, business logic manipulation, and abuse of third-party resources. The issue is critical and requires immediate attention to maintain the application's security and integrity.

Reserved 2024-05-29 | Published 2024-06-06 | Updated 2024-08-01 | Assigner @huntr_ai


HIGH: 7.4CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N

Problem types

CWE-918 Server-Side Request Forgery (SSRF)

Product status

Any version
affected

References

huntr.com/bounties/d97e23e7-172f-4862-a732-86bfc0b7860e

cve.org (CVE-2024-5482)

nvd.nist.gov (CVE-2024-5482)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2024-5482

Support options

Helpdesk Chat, Email, Knowledgebase