Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') (CWE-22)
A path traversal vulnerability has been identified in the `/set_personality_config` endpoint of parisneo/lollms version 9.4.0. This vulnerability allows an attacker to overwrite the `configs/config.yaml` file, potentially leading to remote code execution by modifying server configuration properties such as `force_accept_remote_access` and `turn_on_code_validation`.
The impact of this vulnerability is severe. An attacker exploiting this vulnerability could gain unauthorized access to the system, potentially leading to remote code execution. This could result in complete compromise of the affected system, allowing the attacker to execute arbitrary code, modify or delete sensitive data, and potentially use the compromised system as a launching point for further attacks. The vulnerability affects the confidentiality, integrity, and availability of the system, all of which are rated as "HIGH" impact according to the CVSS score.
There is no evidence that a public proof-of-concept exists. There is no evidence of proof of exploitation at the moment.
A patch is available for this vulnerability. The patch details were added on 2024-06-27, as indicated by the Github Advisory. Users should update to the latest version of parisneo/lollms that addresses this vulnerability.
To mitigate this vulnerability, the following steps are recommended: 1. Update parisneo/lollms to the latest patched version immediately. 2. If immediate updating is not possible, consider temporarily disabling the `/set_personality_config` endpoint until the update can be applied. 3. Implement strict input validation and sanitization for all user-supplied input, especially for file paths. 4. Apply the principle of least privilege to limit the potential impact of successful exploits. 5. Monitor system logs for any suspicious activities related to file access or configuration changes. 6. Regularly review and audit server configurations to ensure security settings haven't been compromised.
NVD published the first details for CVE-2024-5824
Feedly found the first article mentioning CVE-2024-5824. See article
Feedly estimated the CVSS score as HIGH
EPSS Score was set to: 0.04% (Percentile: 10.6%)
A CVSS base score of 7.4 has been assigned.