Lord of Large Language Models (LoLLMs) Server path traversal vulnerability in lollms_file_system.py
Low severity
GitHub Reviewed
Published
Oct 11, 2024
to the GitHub Advisory Database
•
Updated Oct 11, 2024
Description
Published by the National Vulnerability Database
Oct 11, 2024
Published to the GitHub Advisory Database
Oct 11, 2024
Reviewed
Oct 11, 2024
Last updated
Oct 11, 2024
A path traversal vulnerability exists in the ParisNeo/lollms repository, specifically in the
lollms_file_system.py
file. The functionsadd_rag_database
,toggle_mount_rag_database
, andvectorize_folder
do not implement security measures such assanitize_path_from_endpoint
orsanitize_path
. This allows an attacker to perform vectorize operations on.sqlite
files in any directory on the victim's computer, potentially installing multiple packages and causing a crash.References