latest
CVE-2024-5824 describes a path traversal vulnerability discovered in the /setpersonalityconfig endpoint of the parisneo/lollms project. This flaw allows unauthorized users to overwrite critical configuration files, potentially enabling remote code execution. The vulnerability impacts versions of lollms up to and including the latest release, and a fix is available in the latest version.
The /setpersonalityconfig endpoint in lollms is vulnerable to path traversal, enabling attackers to manipulate file paths and access or modify files outside the intended directory. Specifically, an attacker can overwrite the configs/config.yaml file. This file contains crucial server configuration properties, including forceacceptremoteaccess and turnoncodevalidation. By modifying these settings, an attacker could disable security features, gain unauthorized remote access, or execute arbitrary code on the server. Successful exploitation could lead to a complete compromise of the lollms instance and potentially the underlying system.
CVE-2024-5824 was publicly disclosed on 2024-06-27. Currently, there are no known public exploits or active campaigns targeting this vulnerability. The vulnerability is not listed on the CISA KEV catalog as of this writing. The CVSS score of 7.4 (HIGH) indicates a significant risk, and it is recommended to apply the patch or implement mitigations promptly.
Organizations and individuals deploying lollms, particularly those with publicly accessible instances or those lacking robust access controls, are at risk. Shared hosting environments where multiple users share the same lollms instance are also particularly vulnerable, as a compromised user could potentially impact other users on the same server.
• python / server:
import os
import requests
url = 'http://your-lollms-instance/set_personality_config' # Replace with your lollms instance
# Attempt path traversal
payload = "/../../../../etc/passwd"
# Send a request with the payload
response = requests.post(url, data={'personality_config': payload})
# Check the response status code
if response.status_code == 200:
print("Potential Path Traversal Vulnerability Detected!")
else:
print("No Path Traversal Detected.")• generic web:
curl -I http://your-lollms-instance/set_personality_config/%2e%2e%2f%2e%2e%2fetc/passwd• generic web:
grep -r 'force_accept_remote_access: true' /path/to/lollms/configs/config.yamldisclosure
Exploit-Status
EPSS
1.40% (80% Perzentil)
CISA SSVC
CVSS-Vektor
The primary mitigation for CVE-2024-5824 is to upgrade to the latest version of lollms, which includes a fix for the path traversal vulnerability. If upgrading immediately is not feasible, consider implementing temporary workarounds. Restrict access to the /setpersonalityconfig endpoint to trusted users only. Implement strict input validation on the endpoint to prevent malicious path manipulation. Consider using a Web Application Firewall (WAF) to filter out requests containing path traversal attempts. Monitor system logs for suspicious file access or modification activity.
Actualice a la última versión de lollms. El commit eda3af5f5c4ea9b2f3569f72f8d05989e29367fc corrige la vulnerabilidad de path traversal. Asegúrese de reiniciar el servidor después de la actualización.
Schwachstellenanalysen und kritische Warnungen direkt in deinen Posteingang.
CVE-2024-5824 is a Path Traversal vulnerability in the /setpersonalityconfig endpoint of lollms, allowing attackers to overwrite configuration files and potentially achieve remote code execution.
You are affected if you are running lollms versions ≤latest. Upgrade to the latest version to mitigate the risk.
Upgrade to the latest version of lollms. As a temporary workaround, implement a WAF rule to block malicious requests to the /setpersonalityconfig endpoint.
There is currently no evidence of active exploitation, but the vulnerability's nature makes it easily exploitable.
Refer to the parisneo/lollms project repository and associated security advisories for the latest information.
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.
Lade deine requirements.txt-Datei hoch und wir sagen dir sofort, ob du betroffen bist.