We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-7033

Arbitrary File Write in open-webui/open-webui



Description

In version 0.3.8 of open-webui/open-webui, an arbitrary file write vulnerability exists in the download_model endpoint. When deployed on Windows, the application improperly handles file paths, allowing an attacker to manipulate the file path to write files to arbitrary locations on the server's filesystem. This can result in overwriting critical system or application files, causing denial of service, or potentially achieving remote code execution (RCE). RCE can allow an attacker to execute malicious code with the privileges of the user running the application, leading to a full system compromise.

Reserved 2024-07-23 | Published 2025-03-20 | Updated 2025-03-20 | Assigner @huntr_ai


MEDIUM: 6.5CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H

Problem types

CWE-29 Path Traversal: '\..\filename'

Product status

Any version
affected

References

huntr.com/bounties/7078261f-8414-4bb7-9d72-a2a4d8bfd5d1

cve.org (CVE-2024-7033)

nvd.nist.gov (CVE-2024-7033)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2024-7033

Support options

Helpdesk Chat, Email, Knowledgebase