A path traversal vulnerability exists in the ParisNeo/lollms repository, specifically in the lollms_file_system.py
file. The functions add_rag_database
, toggle_mount_rag_database
, and vectorize_folder
do not implement security measures such as sanitize_path_from_endpoint
or sanitize_path
. This allows an attacker to perform vectorize operations on .sqlite
files in any directory on the victim's computer, potentially installing multiple packages and causing a crash.
{ "nvd_published_at": "2024-10-11T13:15:16Z", "cwe_ids": [ "CWE-22" ], "severity": "LOW", "github_reviewed": true, "github_reviewed_at": "2024-10-11T17:47:38Z" }