A path traversal vulnerability exists in the parisneo/lollms-webui, specifically within the 'copy_to_custom_personas' endpoint in the 'lollms_personalities_infos.py' file. This vulnerability allows attackers to read arbitrary files by manipulating the 'category' and 'name' parameters during the 'Copy to custom personas folder for editing' process. By inserting '../' sequences in these parameters, attackers can traverse the directory structure and access files outside of the intended directory. Successful exploitation results in unauthorized access to sensitive information.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: @huntr_ai
Published:
Updated: 2024-08-01T19:03:39.289Z
Reserved: 2024-03-04T20:51:54.358Z
Link: CVE-2024-2178

Updated: 2024-08-01T19:03:39.289Z

Status : Awaiting Analysis
Published: 2024-06-02T11:15:07.390
Modified: 2024-11-21T09:09:11.810
Link: CVE-2024-2178

No data.