CVE-2024-6250
📋 TL;DR
An absolute path traversal vulnerability in parisneo/lollms-webui v9.6 allows attackers to read arbitrary files and list directories on Windows systems. This affects users running the vulnerable version of lollms-webui with the open_file endpoint accessible. Attackers can exploit this to access sensitive system files.
💻 Affected Systems
- parisneo/lollms-webui
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise via reading sensitive files like passwords, SSH keys, or configuration files, potentially leading to lateral movement or data exfiltration.
Likely Case
Unauthorized access to sensitive application data, user files, or system information stored on the Windows filesystem.
If Mitigated
Limited impact if proper network segmentation, file permissions, and access controls restrict what files can be accessed even with path traversal.
🎯 Exploit Status
Exploitation requires access to the open_file endpoint; authentication status depends on lollms-webui configuration.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: v9.7 or later
Vendor Advisory: https://huntr.com/bounties/11a8bf9d-16f3-49b3-b5fc-ad36d8993c73
Restart Required: Yes
Instructions:
1. Update lollms-webui to version 9.7 or later. 2. Restart the lollms-webui service. 3. Verify the fix by checking the version and testing path traversal attempts.
🔧 Temporary Workarounds
Disable open_file endpoint
allTemporarily disable or restrict access to the vulnerable open_file endpoint in lollms_advanced.py.
# Modify lollms_advanced.py to comment out or remove open_file endpoint handling
Restrict file system permissions
windowsSet strict file permissions on sensitive directories and files to limit what the lollms-webui process can access.
icacls C:\sensitive\path /deny lollms-user:(R,W)
# Adjust paths and user as needed
🧯 If You Can't Patch
- Implement network segmentation to isolate lollms-webui from sensitive systems and restrict inbound access to the service.
- Monitor and audit file access logs for unusual patterns indicating exploitation attempts.
🔍 How to Verify
Check if Vulnerable:
Check if running lollms-webui version 9.6 and test the open_file endpoint with absolute path payloads (e.g., C:\Windows\win.ini).
Check Version:
python -c "import lollms; print(lollms.__version__)" or check the web UI interface for version info.
Verify Fix Applied:
After updating, retest the open_file endpoint with absolute path payloads; successful requests should be blocked or sanitized.
📡 Detection & Monitoring
Log Indicators:
- Unusual file access patterns in lollms-webui logs, especially requests to open_file with absolute paths like C:\ or D:\.
Network Indicators:
- HTTP requests to /open_file endpoint containing absolute Windows paths in parameters.
SIEM Query:
source="lollms-webui" AND (uri_path="/open_file" AND (param="C:\\" OR param="D:\\"))