CVE-2024-4330

A path traversal vulnerability was identified in the parisneo/lollms-webui repository, specifically within version 9.6. The vulnerability arises due to improper handling of user-supplied input in the 'list_personalities' endpoint. By crafting a malicious HTTP request, an attacker can traverse the directory structure and view the contents of any folder, albeit limited to subfolder names only. This issue was demonstrated via a specific HTTP request that manipulated the 'category' parameter to access arbitrary directories. The vulnerability is present in the code located at the 'endpoints/lollms_advanced.py' file.
References
Link Resource
https://huntr.com/bounties/154a78d5-3960-4fc6-8666-f982b5e70ed7 Exploit Third Party Advisory Issue Tracking Patch
https://huntr.com/bounties/154a78d5-3960-4fc6-8666-f982b5e70ed7 Exploit Third Party Advisory Issue Tracking Patch
Configurations

Configuration 1 (hide)

cpe:2.3:a:lollms:lollms_web_ui:*:*:*:*:*:*:*:*

History

09 Jul 2025, 14:27

Type Values Removed Values Added
First Time Lollms
Lollms lollms Web Ui
CVSS v2 : unknown
v3 : 4.0
v2 : unknown
v3 : 3.3
References () https://huntr.com/bounties/154a78d5-3960-4fc6-8666-f982b5e70ed7 - () https://huntr.com/bounties/154a78d5-3960-4fc6-8666-f982b5e70ed7 - Exploit, Third Party Advisory, Issue Tracking, Patch
CPE cpe:2.3:a:lollms:lollms_web_ui:*:*:*:*:*:*:*:*

21 Nov 2024, 09:42

Type Values Removed Values Added
Summary
  • (es) Se identificó una vulnerabilidad de path traversal en el repositorio parisneo/lollms-webui, específicamente en la versión 9.6. La vulnerabilidad surge debido al manejo inadecuado de la entrada proporcionada por el usuario en el endpoint 'list_personalities'. Al crear una solicitud HTTP maliciosa, un atacante puede atravesar la estructura del directorio y ver el contenido de cualquier carpeta, aunque limitado únicamente a los nombres de las subcarpetas. Este problema se demostró mediante una solicitud HTTP específica que manipulaba el parámetro 'categoría' para acceder a directorios arbitrarios. La vulnerabilidad está presente en el código ubicado en el archivo 'endpoints/lollms_advanced.py'.
References () https://huntr.com/bounties/154a78d5-3960-4fc6-8666-f982b5e70ed7 - () https://huntr.com/bounties/154a78d5-3960-4fc6-8666-f982b5e70ed7 -

30 May 2024, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-30 15:15

Updated : 2025-07-09 14:27


NVD link : CVE-2024-4330

Mitre link : CVE-2024-4330

CVE.ORG link : CVE-2024-4330


JSON object : View

Products Affected

lollms

  • lollms_web_ui
CWE
CWE-23

Relative Path Traversal