Path Traversal Leading to Remote Code Execution
A path traversal vulnerability in version 9.4.0 allows attackers to overwrite the `configs/config.yaml` file via the `/set_personality_config` endpoint, leading to remote code execution. This issue was patched in the latest version.
Available publicly on Jun 15 2024
Remediation Steps
- Update to the latest version of the software.
- Ensure proper sanitization of input values in the
/set_personality_config
endpoint. - Implement additional validation checks to prevent path traversal attacks.
- Regularly review and audit code for security vulnerabilities.
Patch Details
- Fixed Version: latest
- Patch Commit: https://github.com/ParisNeo/lollms/commit/eda3af5f5c4ea9b2f3569f72f8d05989e29367fc
Want more out of Sightline?
Sightline offers even more for premium customers
Go Premium
We have - related security advisories that are available with Sightline Premium.