Home » Database

AVID-2026-R1461

Description

Remote Code Execution in create_conda_env function in parisneo/lollms (CVE-2024-3121)

Details

A remote code execution vulnerability exists in the create_conda_env function of the parisneo/lollms repository, version 5.9.0. The vulnerability arises from the use of shell=True in the subprocess.Popen function, which allows an attacker to inject arbitrary commands by manipulating the env_name and python_version parameters. This issue could lead to a serious security breach as demonstrated by the ability to execute the ‘whoami’ command among potentially other harmful commands.

Reason for inclusion in AVID: CVE-2024-3121 describes a remote code execution flaw in parisneo/lollms’s create_conda_env using shell=True in subprocess.Popen, enabling arbitrary commands via controlled env_name/python_version. This vulnerability resides in software used to build/run AI models (Lollms), impacting the AI software stack and environments. It constitutes a software supply-chain risk for general-purpose AI systems since an attacker could exploit environment creation during installation/deployment. The CVE text provides explicit RCE potential and affected code path.

References

Affected or Relevant Artifacts

  • Developer: parisneo
  • Deployer: parisneo
  • Artifact Details:
TypeName
Systemparisneo/lollms

Impact

AVID Taxonomy Categorization

  • Risk domains: Security
  • SEP subcategories: S0100: Software Vulnerability
  • Lifecycle stages: L06: Deployment

CVSS

Version3.0
Vector StringCVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Base Score6.8
Base Severity🟠 Medium
Attack VectorPHYSICAL
Attack Complexity🟢 Low
Privileges RequiredNONE
User InteractionNONE
ScopeUNCHANGED
Confidentiality Impact🔴 High
Integrity Impact🔴 High
Availability Impact🔴 High

CWE

IDDescription
CWE-94CWE-94 Improper Control of Generation of Code

Other information

  • Report Type: Advisory
  • Credits:
  • Date Reported: 2024-06-24
  • Version: 0.3.3
  • AVID Entry