CVE-2024-6250

7.5 HIGH

📋 TL;DR

An absolute path traversal vulnerability in parisneo/lollms-webui v9.6 allows attackers to read arbitrary files and list directories on Windows systems. This affects users running the vulnerable version of lollms-webui with the open_file endpoint accessible. Attackers can exploit this to access sensitive system files.

💻 Affected Systems

Products:
  • parisneo/lollms-webui
Versions: v9.6
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Windows systems due to absolute path handling; Linux/macOS systems may not be vulnerable to the same exploit.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise via reading sensitive files like passwords, SSH keys, or configuration files, potentially leading to lateral movement or data exfiltration.

🟠

Likely Case

Unauthorized access to sensitive application data, user files, or system information stored on the Windows filesystem.

🟢

If Mitigated

Limited impact if proper network segmentation, file permissions, and access controls restrict what files can be accessed even with path traversal.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires access to the open_file endpoint; authentication status depends on lollms-webui configuration.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v9.7 or later

Vendor Advisory: https://huntr.com/bounties/11a8bf9d-16f3-49b3-b5fc-ad36d8993c73

Restart Required: Yes

Instructions:

1. Update lollms-webui to version 9.7 or later. 2. Restart the lollms-webui service. 3. Verify the fix by checking the version and testing path traversal attempts.

🔧 Temporary Workarounds

Disable open_file endpoint

all

Temporarily disable or restrict access to the vulnerable open_file endpoint in lollms_advanced.py.

# Modify lollms_advanced.py to comment out or remove open_file endpoint handling

Restrict file system permissions

windows

Set strict file permissions on sensitive directories and files to limit what the lollms-webui process can access.

icacls C:\sensitive\path /deny lollms-user:(R,W)
# Adjust paths and user as needed

🧯 If You Can't Patch

  • Implement network segmentation to isolate lollms-webui from sensitive systems and restrict inbound access to the service.
  • Monitor and audit file access logs for unusual patterns indicating exploitation attempts.

🔍 How to Verify

Check if Vulnerable:

Check if running lollms-webui version 9.6 and test the open_file endpoint with absolute path payloads (e.g., C:\Windows\win.ini).

Check Version:

python -c "import lollms; print(lollms.__version__)" or check the web UI interface for version info.

Verify Fix Applied:

After updating, retest the open_file endpoint with absolute path payloads; successful requests should be blocked or sanitized.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns in lollms-webui logs, especially requests to open_file with absolute paths like C:\ or D:\.

Network Indicators:

  • HTTP requests to /open_file endpoint containing absolute Windows paths in parameters.

SIEM Query:

source="lollms-webui" AND (uri_path="/open_file" AND (param="C:\\" OR param="D:\\"))

🔗 References

📤 Share & Export