We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In version v12 of parisneo/lollms-webui, the 'Send file to AL' function allows uploading files with various extensions, including potentially dangerous ones like .py, .sh, .bat, and more. Attackers can exploit this by uploading files with malicious content and then using the '/open_file' API endpoint to execute these files. The vulnerability arises from the use of 'subprocess.Popen' to open files without proper validation, leading to potential remote code execution.
Reserved 2024-10-13 | Published 2025-03-20 | Updated 2025-03-20 | Assigner @huntr_aiCWE-434 Unrestricted Upload of File with Dangerous Type
huntr.com/bounties/c70c6732-23b3-4ef8-aec6-0a47467d1ed5
Support options