Critical

lollms

Windows Path Traversal

A vulnerability in the lollms application allows attackers to perform directory traversal attacks on Windows systems due to improper sanitization of Windows-style paths. The issue affects version 9.5 and was patched in version 9.8.

Available publicly on Jun 12 2024

Remediation Steps
  • Update to lollms version 9.8 or later.
  • Ensure that all path sanitization functions properly handle Windows-style paths (backslashes).
  • Regularly audit and test security measures to prevent directory traversal and other types of attacks.
  • Consider implementing additional layers of security, such as firewalls and intrusion detection systems, to mitigate the risk of exploitation.
Patch Details
  • Fixed Version: 9.8
  • Patch Commit: https://github.com/ParisNeo/lollms/commit/95ad36eeffc6a6be3e3f35ed35a384d768f0ecf6
Want more out of Sightline?

Sightline offers even more for premium customers

Go Premium

We have - related security advisories that are available with Sightline Premium.