High Severity

lollms-webui

Path Traversal Vulnerability in Personality Duplication Feature

A Local File Inclusion (LFI) vulnerability was discovered in the 'Copy to custom personas folder for editing' feature of the LoLLMs web UI, affecting the latest version. This vulnerability allows attackers to read arbitrary files from the server by exploiting unsanitized input fields. The issue was identified in the endpoint responsible for duplicating personalities to a custom folder, where path traversal payloads could be injected.

Available publicly on Jun 02 2024

7.5

CVSS:

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Credit:

retr0reg
Remediation Steps
  • Ensure input validation and sanitization for all parameters received from the client.
  • Implement a whitelist of allowed paths for file operations to prevent directory traversal.
  • Regularly update the software to the latest version to incorporate security patches.
  • Employ a web application firewall (WAF) to detect and block malicious requests containing path traversal sequences.
  • Conduct regular security audits and penetration testing to identify and mitigate vulnerabilities.
Patch Details
  • Fixed Version: N/A
  • Patch Commit: N/A
Want more out of Sightline?

Sightline offers even more for premium customers

Go Premium

We have 291 related security advisories that are available with Sightline Premium.