Description
A path traversal vulnerability exists in the parisneo/lollms-webui, specifically within the 'copy_to_custom_personas' endpoint in the 'lollms_personalities_infos.py' file. This vulnerability allows attackers to read arbitrary files by manipulating the 'category' and 'name' parameters during the 'Copy to custom personas folder for editing' process. By inserting '../' sequences in these parameters, attackers can traverse the directory structure and access files outside of the intended directory. Successful exploitation results in unauthorized access to sensitive information.
References
https://huntr.com/bounties/e585f1dd-a026-4419-8f42-5835e85fad9e
https://huntr.com/bounties/e585f1dd-a026-4419-8f42-5835e85fad9e
CVSS impact metrics
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
7.5 · High
Information
Source identifier
Vulnerability status
Analyzed
Published
2024-06-02T09:15:07.390Z
1 year agoLast modified
2025-07-09T12:25:18.873Z
8 months ago