ID |
CVE-2024-7034
|
Sažetak |
In open-webui version 0.3.8, the endpoint `/models/upload` is vulnerable to arbitrary file write due to improper handling of user-supplied filenames. The vulnerability arises from the usage of `file_path = f"{UPLOAD_DIR}/{file.filename}"` without proper input validation or sanitization. An attacker can exploit this by manipulating the `file.filename` parameter to include directory traversal sequences, causing the resulting `file_path` to escape the intended `UPLOAD_DIR` and potentially overwrite arbitrary files on the system. This can lead to unauthorized modifications of system binaries, configuration files, or sensitive data, potentially enabling remote command execution. |
Reference |
|
CVSS |
Base: | 6.5 |
Impact: | 5.2 |
Exploitability: | 1.2 |
|
Pristup |
Vektor | Složenost | Autentikacija |
NETWORK |
LOW |
HIGH |
|
Impact |
Povjerljivost | Cjelovitost | Dostupnost |
NONE |
HIGH |
HIGH |
|
CVSS vektor |
CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H |
Zadnje važnije ažuriranje |
20-03-2025 - 10:15 |
Objavljeno |
20-03-2025 - 10:15 |