Home » Database

AVID-2026-R1431

Description

Improper Neutralization of Special Elements used in an OS Command in parisneo/lollms-webui (CVE-2024-2359)

Details

A vulnerability in the parisneo/lollms-webui version 9.3 allows attackers to bypass intended access restrictions and execute arbitrary code. The issue arises from the application’s handling of the /execute_code endpoint, which is intended to be blocked from external access by default. However, attackers can exploit the /update_setting endpoint, which lacks proper access control, to modify the host configuration at runtime. By changing the host setting to an attacker-controlled value, the restriction on the /execute_code endpoint can be bypassed, leading to remote code execution. This vulnerability is due to improper neutralization of special elements used in an OS command (Improper Neutralization of Special Elements used in an OS Command).

Reason for inclusion in AVID: CVE-2024-2359 describes a remote code execution vulnerability in parisneo/lollms-webui, an AI-related web UI used to run general-purpose AI models. It affects the AI software stack (web endpoints and access control) and enables arbitrary code execution, a security vulnerability. It impacts components used to deploy/run AI systems, i.e., the GP AI supply chain. The report provides CVE details and an exploit scenario, giving sufficient signal.

References

Affected or Relevant Artifacts

  • Developer: parisneo
  • Deployer: parisneo
  • Artifact Details:
TypeName
Systemparisneo/lollms-webui

Impact

AVID Taxonomy Categorization

  • Risk domains: Security
  • SEP subcategories: S0100: Software Vulnerability
  • Lifecycle stages: L06: Deployment

CVSS

Version3.0
Vector StringCVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Base Score9.8
Base Severity🔴 Critical
Attack VectorNETWORK
Attack Complexity🟢 Low
Privileges RequiredNONE
User InteractionNONE
ScopeUNCHANGED
Confidentiality Impact🔴 High
Integrity Impact🔴 High
Availability Impact🔴 High

CWE

IDDescription
CWE-78CWE-78 Improper Neutralization of Special Elements used in an OS Command

Other information

  • Report Type: Advisory
  • Credits:
  • Date Reported: 2024-06-06
  • Version: 0.3.3
  • AVID Entry