Description
nesquena hermes-webui contains a trust-boundary failure vulnerability that allows authenticated attackers to set or change a session workspace to an arbitrary existing directory on disk by manipulating workspace path parameters in endpoints such as /api/session/new, /api/session/update, /api/chat/start, and /api/workspaces/add. Attackers can repoint a session workspace to a directory outside the intended trusted root and then use ordinary file read and write APIs to access or modify files outside the intended workspace boundary within the permissions of the hermes-webui process.
Problem types
CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Product status
Any version before PR #416
Credits
Chia Min Jun Lennon
References
github.com/nesquena/hermes-webui/pull/416 (Pull Request)
github.com/...ommit/2a7a5ddfaf39e3b0094b7ac37e9f1dbcf40a3918 (Patch Commit)
github.com/nesquena/hermes-webui/releases/tag/v0.50.34 (Release Notes)
www.vulncheck.com/...ui-arbitrary-workspace-directory-access