A vulnerability was found in HKUDS LightRAG up to 1.3.8. It has been declared as critical. Affected by this vulnerability is the function upload_to_input_dir of the file lightrag/api/routers/document_routes.py of the component File Upload. The manipulation of the argument file.filename leads to path traversal. It is possible to launch the attack on the local host. The identifier of the patch is 60777d535b719631680bcf5d0969bdef79ca4eaf. It is recommended to apply a patch to fix this issue.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
https://vuldb.com/?id.314089 | vdb entry technical description |
https://vuldb.com/?ctiid.314089 | signature permissions required |
https://vuldb.com/?submit.601276 | third party advisory |
https://github.com/HKUDS/LightRAG/issues/1692 | issue tracking |
https://github.com/HKUDS/LightRAG/issues/1692#issuecomment-3009368235 | issue tracking |
https://github.com/HKUDS/LightRAG/commit/60777d535b719631680bcf5d0969bdef79ca4eaf | patch |