CVE-2024-2288

8.3 HIGH

📋 TL;DR

A CSRF vulnerability in Lollms WebUI versions up to 7.3.0 allows attackers to change victims' profile pictures without consent. This can lead to denial of service through filesystem overload or enable stored XSS attacks executing arbitrary JavaScript in victims' browser sessions. Users of affected versions are at risk.

💻 Affected Systems

Products:
  • Lollms WebUI
Versions: Up to and including 7.3.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the profile picture upload functionality; any deployment with this feature enabled is affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers execute arbitrary JavaScript in victim sessions, potentially stealing credentials, hijacking accounts, or performing actions as the victim, combined with filesystem denial of service.

🟠

Likely Case

Attackers change profile pictures to malicious content, causing reputation damage or minor disruption, with potential for XSS payloads to steal session cookies.

🟢

If Mitigated

Limited to nuisance-level profile picture changes if CSRF protections block exploitation, though XSS risk remains if other vulnerabilities exist.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires victim interaction with a malicious site while authenticated; CSRF attacks are well-understood and tools exist to automate them.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 9.3

Vendor Advisory: https://github.com/parisneo/lollms-webui/commit/ed085e6effab2b1e25ba2b00366a16ff67d8551b

Restart Required: Yes

Instructions:

1. Backup current configuration and data. 2. Update Lollms WebUI to version 9.3 or later using git pull or package manager. 3. Restart the application service. 4. Verify the fix by checking the version.

🔧 Temporary Workarounds

Disable Profile Picture Upload

all

Temporarily disable the vulnerable profile picture upload functionality to prevent exploitation.

Modify application configuration to remove or disable profile picture upload endpoints.

Implement CSRF Tokens Manually

all

Add CSRF protection tokens to profile picture upload requests if unable to patch immediately.

Add anti-CSRF tokens to forms and validate them server-side for profile picture uploads.

🧯 If You Can't Patch

  • Restrict access to the application to trusted networks only.
  • Use web application firewalls (WAF) to block CSRF attempts and monitor for suspicious uploads.

🔍 How to Verify

Check if Vulnerable:

Check if Lollms WebUI version is 7.3.0 or earlier by reviewing the application version in the UI or configuration files.

Check Version:

Check the application's version in the web interface or run 'git log --oneline -1' in the installation directory for commit info.

Verify Fix Applied:

Confirm the application version is 9.3 or later and test profile picture upload functionality with CSRF simulation tools to ensure it's protected.

📡 Detection & Monitoring

Log Indicators:

  • Unusual profile picture uploads from unexpected IPs or user agents
  • Multiple failed upload attempts or large file uploads indicating DoS attempts

Network Indicators:

  • HTTP POST requests to profile picture upload endpoints without CSRF tokens
  • Traffic patterns suggesting automated CSRF attacks

SIEM Query:

source="lollms_logs" AND (event="profile_upload" AND csrf_token="missing") OR (file_size>threshold)

🔗 References

📤 Share & Export