🚨High Risk Vulnerability Alert! 🚨: CVE-2024-3435 A path traversal vulnerability exists in the 'save_settings' endpoint of the parisneo/lollms-webui application, affecting versions up to the latest release before 9.5. The vulnerability arises due to insufficient sanitization of the 'config' parameter in the 'apply_settings' function, allowing an attacker to manipulate the application's configuration by sending specially crafted JSON payloads. This could lead to remote code execution (RCE) by bypassing existing patches designed to mitigate such vulnerabilities. CVSSv3.1 Base Score: 8.4 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N) #lollms #parisneo #apisecurity #owasp https://lnkd.in/drxXWheK
API ThreatStats’ Post
More Relevant Posts
-
⚠️Medium Risk Vulnerability Alert⚠️: CVE-2023-34276 D-Link DIR-2150 SetTriggerPPPoEValidate Username Command Injection Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DIR-2150 routers. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the SOAP API interface, which listens on TCP port 80 by default. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-20554. CVSSv3.1 Base Score: 6.8 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N) #dlink #apisecurity #owasp https://lnkd.in/dR_cfNez
To view or add a comment, sign in
-
⚠️Medium Risk Vulnerability Alert⚠️: CVE-2023-34280 D-Link DIR-2150 SetSysEmailSettings EmailTo Command Injection Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DIR-2150 routers. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the SOAP API interface, which listens on TCP port 80 by default. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-20559. CVSSv3.1 Base Score: 6.8 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N) #dlink #apisecurity #owasp https://lnkd.in/dffhqv94
To view or add a comment, sign in
-
⚠️Medium Risk Vulnerability Alert⚠️: CVE-2023-34277 D-Link DIR-2150 SetSysEmailSettings AccountName Command Injection Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DIR-2150 routers. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the SOAP API interface, which listens on TCP port 80 by default. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-20555. CVSSv3.1 Base Score: 6.8 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N) #dlink #apisecurity #owasp https://lnkd.in/dtF2Z38C
To view or add a comment, sign in
-
⚠️Medium Risk Vulnerability Alert⚠️: CVE-2023-34279 D-Link DIR-2150 GetDeviceSettings Target Command Injection Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DIR-2150 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the SOAP API interface, which listens on TCP port 80 by default. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-20558. CVSSv3.1 Base Score: 6.8 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N) #dlink #apisecurity #owasp https://lnkd.in/dhqGc_jx
To view or add a comment, sign in
-
❗ ALERT ❗ A critical vulnerability (CVE-2023-48788) is affecting Fortinet’s FortiClientEMS, including: - FortiClientEMS 7.2 to 7.2.2. - FortiClientEMS 7.0 to 7.0.10 This vulnerability can result in remote code execution by an unauthenticated threat actor to execute unauthorised code or commands via specifically crafted request. Organisations should implement available patches immediately. Read the full alert at https://lnkd.in/gttKDy2A
To view or add a comment, sign in
-
-
🚨 High Risk Vulnerability Alert! 🚨: CVE-2024-2217 gaizhenbiao/chuanhuchatgpt is vulnerable to improper access control, allowing unauthorized access to the `config.json` file. This vulnerability is present in both authenticated and unauthenticated versions of the application, enabling attackers to obtain sensitive information such as API keys (`openai_api_key`, `google_palm_api_key`, `xmchat_api_key`, etc.), configuration details, and user credentials. The issue stems from the application's handling of HTTP requests for the `config.json` file, which does not properly restrict access based on user authentication. CVSSv3.1 Base Score: 7.5 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N) #apisecurity #owasp https://lnkd.in/didXS_Qg
To view or add a comment, sign in
-
https://lnkd.in/gnjYgnrs CVSSv3 Score 9.6 Impact Execute unauthorized code or commands CVE ID CVE-2024-21762 We recommend conducting immediate verification of the upgrade.
To view or add a comment, sign in
-
❗ HTTP Request Smuggling in non-recommended SysReptor configurations (CVE-2024-1135) CVSSv3.1: High (7.8; CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) Unpatched as of 16 April Workaround: Use a reverse proxy (like Caddy or nginx). If you don't use a reverse proxy for SysReptor and expose the SysReptor port (TCP 8000 by default) directly, you are probably vulnerable to HTTP Request Smuggling attacks. This is due to an unpatched vulnerability in gunicorn. The vulnerability could be well-exploitable for authenticated users and might lead to privilege escalation.
To view or add a comment, sign in
-
Start patching to close any gaps.
❗ ALERT ❗ A critical vulnerability (CVE-2023-48788) is affecting Fortinet’s FortiClientEMS, including: - FortiClientEMS 7.2 to 7.2.2. - FortiClientEMS 7.0 to 7.0.10 This vulnerability can result in remote code execution by an unauthenticated threat actor to execute unauthorised code or commands via specifically crafted request. Organisations should implement available patches immediately. Read the full alert at https://lnkd.in/gttKDy2A
To view or add a comment, sign in
-
-
🚨High Risk Vulnerability Alert! 🚨: CVE-2023-34274 D-Link DIR-2150 LoginPassword Incorrect Implementation of Authentication Algorithm Authentication Bypass Vulnerability. This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link DIR-2150 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the SOAP API interface, which listens on TCP port 80 by default. A crafted login request can cause authentication to succeed without providing proper credentials. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-20552. CVSSv3.1 Base Score: 8.8 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N) #dlink #apisecurity #owasp https://lnkd.in/dHNSD6ZG
To view or add a comment, sign in