Miggo Logo

CVE-2024-4881: LoLLMS Path Traversal vulnerability

7.5

CVSS Score
3.0

Basic Information

EPSS Score
0.39848%
Published
6/6/2024
Updated
10/17/2024
KEV Status
No
Technology
TechnologyPython

Technical Details

CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
lollmspip< 9.5.09.5.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stemmed from improper path sanitization in two functions:

  1. Both functions lacked path.replace('\\', '/') calls in pre-patch versions, leaving Windows-style paths unnormalized.
  2. The absence of backslash handling allowed bypassing Linux-centric path checks (like startswith('/')) when deployed on Windows.
  3. The patch explicitly adds backslash normalization to both functions, confirming they were the vulnerability sources.
  4. The CWE-22/CWE-36 mapping and vulnerability description directly implicate these path-sanitization functions as the failure points.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

* p*t* tr*v*rs*l vuln*r**ility *xists in t** p*risn*o/lollms *ppli**tion, *****tin* v*rsion *.*.* *n* pot*nti*lly **rli*r v*rsions, *ut *ix** in v*rsion *.*.*. T** vuln*r**ility *ris*s *u* to improp*r v*li**tion o* *il* p*t*s **tw**n Win*ows *n* Linu

Reasoning

T** vuln*r**ility st*mm** *rom improp*r p*t* s*nitiz*tion in two *un*tions: *. *ot* *un*tions l**k** `p*t*.r*pl***('\\', '/')` **lls in pr*-p*t** v*rsions, l**vin* Win*ows-styl* p*t*s unnorm*liz**. *. T** **s*n** o* ***ksl*s* **n*lin* *llow** *yp*ssi
CVE-2024-4881: LoLLMS Path Trav File Read | Miggo