We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-9920

Unrestricted File Upload and Execution in parisneo/lollms-webui



Description

In version v12 of parisneo/lollms-webui, the 'Send file to AL' function allows uploading files with various extensions, including potentially dangerous ones like .py, .sh, .bat, and more. Attackers can exploit this by uploading files with malicious content and then using the '/open_file' API endpoint to execute these files. The vulnerability arises from the use of 'subprocess.Popen' to open files without proper validation, leading to potential remote code execution.

Reserved 2024-10-13 | Published 2025-03-20 | Updated 2025-03-20 | Assigner @huntr_ai


MEDIUM: 6.6CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-434 Unrestricted Upload of File with Dangerous Type

Product status

Any version
affected

References

huntr.com/bounties/c70c6732-23b3-4ef8-aec6-0a47467d1ed5

cve.org (CVE-2024-9920)

nvd.nist.gov (CVE-2024-9920)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2024-9920

Support options

Helpdesk Chat, Email, Knowledgebase