In version v12 of parisneo/lollms-webui, the 'Send file to AL' function allows uploading files with various extensions, including potentially dangerous ones like .py, .sh, .bat, and more. Attackers can exploit this by uploading files with malicious content and then using the '/open_file' API endpoint to execute these files. The vulnerability arises from the use of 'subprocess.Popen' to open files without proper validation, leading to potential remote code execution.
Metrics
Affected Vendors & Products
References
History
Thu, 20 Mar 2025 10:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In version v12 of parisneo/lollms-webui, the 'Send file to AL' function allows uploading files with various extensions, including potentially dangerous ones like .py, .sh, .bat, and more. Attackers can exploit this by uploading files with malicious content and then using the '/open_file' API endpoint to execute these files. The vulnerability arises from the use of 'subprocess.Popen' to open files without proper validation, leading to potential remote code execution. | |
Title | Unrestricted File Upload and Execution in parisneo/lollms-webui | |
Weaknesses | CWE-434 | |
References |
| |
Metrics |
cvssV3_0
|

Status: PUBLISHED
Assigner: @huntr_ai
Published: 2025-03-20T10:10:08.169Z
Updated: 2025-03-20T18:31:01.758Z
Reserved: 2024-10-13T14:36:03.568Z
Link: CVE-2024-9920

No data.

Status : Received
Published: 2025-03-20T10:15:50.787
Modified: 2025-03-20T10:15:50.787
Link: CVE-2024-9920

No data.