A vulnerability in the parisneo/lollms-webui version 9.3...
Critical severity
Unreviewed
Published
Jun 6, 2024
to the GitHub Advisory Database
Description
Published by the National Vulnerability Database
Jun 6, 2024
Published to the GitHub Advisory Database
Jun 6, 2024
A vulnerability in the parisneo/lollms-webui version 9.3 allows attackers to bypass intended access restrictions and execute arbitrary code. The issue arises from the application's handling of the
/execute_code
endpoint, which is intended to be blocked from external access by default. However, attackers can exploit the/update_setting
endpoint, which lacks proper access control, to modify thehost
configuration at runtime. By changing thehost
setting to an attacker-controlled value, the restriction on the/execute_code
endpoint can be bypassed, leading to remote code execution. This vulnerability is due to improper neutralization of special elements used in an OS command (Improper Neutralization of Special Elements used in an OS Command
).References