In version v12 of parisneo/lollms-webui, the 'Send file to AL' function allows uploading files with various extensions, including potentially dangerous ones like .py, .sh, .bat, and more. Attackers can exploit this by uploading files with malicious content and then using the '/open_file' API endpoint to execute these files. The vulnerability arises from the use of 'subprocess.Popen' to open files without proper validation, leading to potential remote code execution.
History

Thu, 20 Mar 2025 10:15:00 +0000

Type Values Removed Values Added
Description In version v12 of parisneo/lollms-webui, the 'Send file to AL' function allows uploading files with various extensions, including potentially dangerous ones like .py, .sh, .bat, and more. Attackers can exploit this by uploading files with malicious content and then using the '/open_file' API endpoint to execute these files. The vulnerability arises from the use of 'subprocess.Popen' to open files without proper validation, leading to potential remote code execution.
Title Unrestricted File Upload and Execution in parisneo/lollms-webui
Weaknesses CWE-434
References
Metrics cvssV3_0

{'score': 6.6, 'vector': 'CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: @huntr_ai

Published: 2025-03-20T10:10:08.169Z

Updated: 2025-03-20T18:31:01.758Z

Reserved: 2024-10-13T14:36:03.568Z

Link: CVE-2024-9920

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-03-20T10:15:50.787

Modified: 2025-03-20T10:15:50.787

Link: CVE-2024-9920

cve-icon Redhat

No data.