We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-8982

Local File Inclusion in bentoml/openllm



Description

A Local File Inclusion (LFI) vulnerability in OpenLLM version 0.6.10 allows attackers to include files from the local server through the web application. This flaw could expose internal server files and potentially sensitive information such as configuration files, passwords, and other critical data. Unauthorized access to critical server files, such as configuration files, user credentials (/etc/passwd), and private keys, can lead to a complete compromise of the system's security. Attackers could leverage the exposed information to further penetrate the network, exfiltrate data, or escalate privileges within the environment.

Reserved 2024-09-18 | Published 2025-03-20 | Updated 2025-03-20 | Assigner @huntr_ai


MEDIUM: 6.2CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Problem types

CWE-29 Path Traversal: '\..\filename'

Product status

Any version
affected

References

huntr.com/bounties/b7bdc9a1-51ac-402a-8e6e-0d977699aca6

cve.org (CVE-2024-8982)

nvd.nist.gov (CVE-2024-8982)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2024-8982

Support options

Helpdesk Chat, Email, Knowledgebase