Home » Database

AVID-2026-R1594

Description

Arbitrary File Write in mudler/LocalAI (CVE-2024-6868)

Details

mudler/LocalAI version 2.17.1 allows for arbitrary file write due to improper handling of automatic archive extraction. When model configurations specify additional files as archives (e.g., .tar), these archives are automatically extracted after downloading. This behavior can be exploited to perform a ‘tarslip’ attack, allowing files to be written to arbitrary locations on the server, bypassing checks that normally restrict files to the models directory. This vulnerability can lead to remote code execution (RCE) by overwriting backend assets used by the server.

Reason for inclusion in AVID: The CVE describes an arbitrary file write vulnerability in mudler/LocalAI, a runtime/tool used to run AI models. This directly concerns AI systems, affects a component used to deploy/run AI workloads, poses a security risk (potential RCE), and the report provides explicit CVE details, impact, and references. Therefore it is relevant to the general-purpose AI software supply chain and has sufficient evidence for AVID curation.

References

Affected or Relevant Artifacts

  • Developer: mudler
  • Deployer: mudler
  • Artifact Details:
TypeName
Systemmudler/localai

Impact

AVID Taxonomy Categorization

  • Risk domains: Security
  • SEP subcategories: S0100: Software Vulnerability
  • Lifecycle stages: L06: Deployment

CVSS

Version3.0
Vector StringCVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
Base Score8.1
Base Severity🔴 High
Attack VectorNETWORK
Attack Complexity🟢 Low
Privileges Required🟢 Low
User InteractionNONE
ScopeUNCHANGED
Confidentiality ImpactNONE
Integrity Impact🔴 High
Availability Impact🔴 High

CWE

IDDescription
CWE-59CWE-59 Improper Link Resolution Before File Access

Other information

  • Report Type: Advisory
  • Credits:
  • Date Reported: 2024-10-29
  • Version: 0.3.3
  • AVID Entry