CVE-2024-4078

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-4078
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-4078.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-4078
Aliases
Published
2024-05-16T09:15:15Z
Modified
2024-10-08T04:16:19.228002Z
Summary
[none]
Details

A vulnerability in the parisneo/lollms, specifically in the /unInstall_binding endpoint, allows for arbitrary code execution due to insufficient sanitization of user input. The issue arises from the lack of path sanitization when handling the name parameter in the unInstall_binding function, allowing an attacker to traverse directories and execute arbitrary code by loading a malicious __init__.py file. This vulnerability affects the latest version of the software. The exploitation of this vulnerability could lead to remote code execution on the system where parisneo/lollms is deployed.

References

Affected packages

Git / github.com/parisneo/lollms

Affected ranges

Type
GIT
Repo
https://github.com/parisneo/lollms
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v5.*

v5.9.0