CVE-2024-6959

7.1 HIGH

📋 TL;DR

This vulnerability in parisneo/lollms-webui version 9.8 allows attackers to cause a Denial of Service (DoS) by uploading specially crafted audio files with manipulated multipart boundaries. The lack of CSRF protection enables remote exploitation, making the web interface inaccessible. All users running the vulnerable version are affected.

💻 Affected Systems

Products:
  • parisneo/lollms-webui
Versions: Version 9.8
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with audio file upload functionality enabled and accessible.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service disruption with extended downtime, resource exhaustion leading to system instability, and potential cascading failures in dependent services.

🟠

Likely Case

Temporary service unavailability requiring manual intervention to restart the webui service, with moderate resource consumption during the attack.

🟢

If Mitigated

Minimal impact with proper input validation and CSRF protection in place, potentially causing only brief processing delays.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation is straightforward with publicly available details; CSRF vulnerability enables easy remote attacks.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 9.9 or later

Vendor Advisory: https://huntr.com/bounties/6394d32e-f35c-418a-95b8-e7254ed0bc8e

Restart Required: Yes

Instructions:

1. Update lollms-webui to version 9.9 or later. 2. Restart the lollms-webui service. 3. Verify the update was successful.

🔧 Temporary Workarounds

Disable audio upload functionality

all

Temporarily disable audio file uploads in lollms-webui configuration

Edit configuration to remove or disable audio upload endpoints

Implement CSRF protection

all

Add CSRF tokens to file upload forms and validate them server-side

Implement CSRF middleware and token validation in webui code

🧯 If You Can't Patch

  • Implement strict input validation for multipart boundaries and file uploads
  • Deploy WAF rules to block requests with abnormal boundary lengths or patterns

🔍 How to Verify

Check if Vulnerable:

Check if running lollms-webui version 9.8 by examining version information in the web interface or configuration files.

Check Version:

Check webui interface or run: python -c "import lollms; print(lollms.__version__)" if available

Verify Fix Applied:

Verify version is 9.9 or later and test audio file upload functionality with boundary manipulation attempts.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed or abnormally long audio upload requests
  • High CPU/memory usage from webui process
  • Error logs mentioning multipart boundary parsing issues

Network Indicators:

  • HTTP POST requests to upload endpoints with unusually large boundary parameters
  • Repeated upload attempts from single sources

SIEM Query:

source="webui.log" AND ("audio upload" OR "multipart") AND ("error" OR "timeout" OR "boundary")

🔗 References

📤 Share & Export