parisneo/lollms Local File Inclusion (LFI) attack
Critical severity
GitHub Reviewed
Published
Jun 12, 2024
to the GitHub Advisory Database
•
Updated Jun 12, 2024
Description
Published by the National Vulnerability Database
Jun 12, 2024
Published to the GitHub Advisory Database
Jun 12, 2024
Reviewed
Jun 12, 2024
Last updated
Jun 12, 2024
parisneo/lollms version 9.5 is vulnerable to Local File Inclusion (LFI) attacks due to insufficient path sanitization. The
sanitize_path_from_endpoint
function fails to properly sanitize Windows-style paths (backward slash\
), allowing attackers to perform directory traversal attacks on Windows systems. This vulnerability can be exploited through various routes, includingpersonalities
and/del_preset
, to read or delete any file on the Windows filesystem, compromising the system's availability.References