A path traversal vulnerability exists in the parisneo/lollms-webui application, specifically within the lollms_core/lollms/server/endpoints/lollms_binding_files_server.py
and lollms_core/lollms/security.py
files. Due to inadequate validation of file paths between Windows and Linux environments using Path(path).is_absolute()
, attackers can exploit this flaw to read any file on the system. This issue affects the latest version of LoLLMs running on the Windows platform. The vulnerability is triggered when an attacker sends a specially crafted request to the /user_infos/{path:path}
endpoint, allowing the reading of arbitrary files, as demonstrated with the win.ini
file. The issue has been addressed in version 9.5 of the software.
The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize absolute path sequences such as “/abs/path” that can resolve to a location that is outside of that directory.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Lollms_web_ui | Lollms | * | 9.5 (excluding) |