Description
A path traversal vulnerability in the `/set_personality_config` endpoint of parisneo/lollms version 9.4.0 allows an attacker to overwrite the `configs/config.yaml` file. This can lead to remote code execution by changing server configuration properties such as `force_accept_remote_access` and `turn_on_code_validation`.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-2097 | A path traversal vulnerability in the `/set_personality_config` endpoint of parisneo/lollms version 9.4.0 allows an attacker to overwrite the `configs/config.yaml` file. This can lead to remote code execution by changing server configuration properties such as `force_accept_remote_access` and `turn_on_code_validation`. |
Github GHSA |
GHSA-m45c-v46h-c788 | lollms path traversal vulnerability allows overriding of config.yaml file, leading to RCE |
References
History
No history.
Status: PUBLISHED
Assigner: @huntr_ai
Published:
Updated: 2024-08-01T21:25:03.266Z
Reserved: 2024-06-10T21:22:49.891Z
Link: CVE-2024-5824
Updated: 2024-08-01T21:25:03.266Z
Status : Deferred
Published: 2024-06-27T19:15:17.117
Modified: 2026-04-15T00:35:42.020
Link: CVE-2024-5824
No data.
OpenCVE Enrichment
Updated: 2025-07-12T23:06:34Z
Weaknesses
EUVD
Github GHSA