CVE-2024-6085: lollms vulnerable to path traversal due to unauthenticated root folder settings change
8.6
CVSS Score
3.0
Basic Information
CVE ID
GHSA ID
EPSS Score
0.65415%
CWE
Published
6/27/2024
Updated
6/28/2024
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| lollms | pip | <= 9.5.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from unauthenticated endpoints that handle critical path configuration changes. While exact function names aren't provided in advisories, the described attack pattern requires: 1) A root folder modification function() that removes path restrictions when set to '/', and 2) An output directory configuration function() that allows writing anywhere. These would typically be found in the XTTS server configuration handlers, which the vulnerability specifically references. The high confidence comes from the direct relationship between the described attack vectors and the required functionality to modify these paths.