Description
Hermes WebUI contains an arbitrary file deletion vulnerability in the /api/session/delete endpoint that allows authenticated attackers to delete files outside the session directory by supplying an absolute path or path traversal payload in the session_id parameter. Attackers can exploit unvalidated session identifiers to construct paths that bypass the SESSION_DIR boundary and delete writable JSON files on the host system.
Problem types
CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Product status
Any version before PR #409
Credits
Chia Min Jun Lennon
References
github.com/nesquena/hermes-webui/pull/409 (Pull Request)
github.com/nesquena/hermes-webui/pull/412 (Pull Request)
github.com/...ommit/3cc5839bf303fa6758bfdac538507407a2929655 (Patch Commit)
github.com/nesquena/hermes-webui/releases/tag/v0.50.132 (Release Notes)
github.com/nesquena/hermes-webui/releases/tag/v0.50.32 (Release Notes)
www.vulncheck.com/...ile-deletion-via-unvalidated-session-id