LoLLMS vulnerable to Expected Behavior Violation
High severity
GitHub Reviewed
Published
Jul 20, 2024
to the GitHub Advisory Database
•
Updated Sep 13, 2024
Description
Published by the National Vulnerability Database
Jul 20, 2024
Published to the GitHub Advisory Database
Jul 20, 2024
Reviewed
Sep 13, 2024
Last updated
Sep 13, 2024
A path traversal vulnerability exists in the
apply_settings
function of parisneo/lollms versions prior to 9.5.1. Thesanitize_path
function does not adequately secure thediscussion_db_name
parameter, allowing attackers to manipulate the path and potentially write to important system folders.References