A remote code execution vulnerability exists in the createcondaenv function of the parisneo/lollms repository. The vulnerability arises from the use of shell=True in the subprocess.Popen function, which allows an attacker to inject arbitrary commands by manipulating the envname and pythonversion parameters. This issue could lead to a serious security breach as demonstrated by the ability to execute the 'whoami' command among potentially other harmful commands.
{
"cwe_ids": [
"CWE-78",
"CWE-94"
],
"nvd_published_at": "2024-06-24T00:15:09Z",
"severity": "MODERATE",
"github_reviewed_at": "2024-06-24T21:25:40Z",
"github_reviewed": true
}