A remote code execution (RCE) vulnerability exists in the...
Critical severity
Unreviewed
Published
Jun 6, 2024
to the GitHub Advisory Database
•
Updated Oct 17, 2024
Description
Published by the National Vulnerability Database
Jun 6, 2024
Published to the GitHub Advisory Database
Jun 6, 2024
Last updated
Oct 17, 2024
A remote code execution (RCE) vulnerability exists in the '/install_extension' endpoint of the parisneo/lollms-webui application, specifically within the
@router.post("/install_extension")
route handler. The vulnerability arises due to improper handling of thename
parameter in theExtensionBuilder().build_extension()
method, which allows for local file inclusion (LFI) leading to arbitrary code execution. An attacker can exploit this vulnerability by crafting a maliciousname
parameter that causes the server to load and execute a__init__.py
file from an arbitrary location, such as the upload directory for discussions. This vulnerability affects the latest version of parisneo/lollms-webui and can lead to remote code execution without requiring user interaction, especially when the application is exposed to an external endpoint or operated in headless mode.References