CVE-2024-1873

Path Traversal and Denial of Service in parisneo/lollms-webui

Description

parisneo/lollms-webui is vulnerable to path traversal and denial of service attacks due to an exposed `/select_database` endpoint in version a9d16b0. The endpoint improperly handles file paths, allowing attackers to specify absolute paths when interacting with the `DiscussionsDB` instance. This flaw enables attackers to create directories anywhere on the system where the application has permissions, potentially leading to denial of service by creating directories with names of critical files, such as HTTPS certificate files, causing server startup failures. Additionally, attackers can manipulate the database path, resulting in the loss of client data by constantly changing the file location to an attacker-controlled location, scattering the data across the filesystem and making recovery difficult.

Category

9.1
CVSS
Severity: Critical
CVSS 3.1 •
CVSS 3.0 •
EPSS 0.08%
Third-Party Advisory huntr.com
Affected: parisneo parisneo/lollms-webui
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2024-1873?
CVE-2024-1873 has been scored as a critical severity vulnerability.
How to fix CVE-2024-1873?
To fix CVE-2024-1873, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2024-1873 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2024-1873 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2024-1873?
CVE-2024-1873 affects parisneo parisneo/lollms-webui.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.