Description
A path traversal vulnerability in the `/set_personality_config` endpoint of parisneo/lollms version 9.4.0 allows an attacker to overwrite the `configs/config.yaml` file. This can lead to remote code execution by changing server configuration properties such as `force_accept_remote_access` and `turn_on_code_validation`.
Published: 2024-06-27
Score: 7.4 High
EPSS: 1.4% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2024-2097 A path traversal vulnerability in the `/set_personality_config` endpoint of parisneo/lollms version 9.4.0 allows an attacker to overwrite the `configs/config.yaml` file. This can lead to remote code execution by changing server configuration properties such as `force_accept_remote_access` and `turn_on_code_validation`.
Github GHSA Github GHSA GHSA-m45c-v46h-c788 lollms path traversal vulnerability allows overriding of config.yaml file, leading to RCE
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: @huntr_ai

Published:

Updated: 2024-08-01T21:25:03.266Z

Reserved: 2024-06-10T21:22:49.891Z

Link: CVE-2024-5824

cve-icon Vulnrichment

Updated: 2024-08-01T21:25:03.266Z

cve-icon NVD

Status : Deferred

Published: 2024-06-27T19:15:17.117

Modified: 2026-04-15T00:35:42.020

Link: CVE-2024-5824

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-07-12T23:06:34Z

Weaknesses