Critical Severity

lollms

Path Traversal Vulnerability

A path traversal vulnerability was identified in the parisneo/lollms web application, specifically within its path sanitization functions, allowing for arbitrary file reading when the application is run on Windows. This issue affects the latest version prior to 9.6, which contains the patch.

Available publicly on May 20 2024

9.8

CVSS:

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Credit:

trongphuc12
Remediation Steps
  • Update the parisneo/lollms application to version 9.6 or later.
  • Review and strengthen path sanitization functions to ensure they properly handle Windows path formats.
  • Conduct a thorough security review of the application to identify and remediate any similar vulnerabilities.
  • Consider implementing additional security controls such as file access permissions and user input validation to mitigate the risk of similar vulnerabilities.
Patch Details
  • Fixed Version: 9.6
  • Patch Commit: https://github.com/ParisNeo/lollms/commit/f4424cfc3d6dfb3ad5ac17dd46801efe784933e9
Want more out of Sightline?

Sightline offers even more for premium customers

Go Premium

We have - related security advisories that are available with Sightline Premium.