PyPi: Lollms

CVE-2024-3121

Safety vulnerability ID: 71778

This vulnerability was reviewed by experts

The information on this page was manually curated by our Cybersecurity Intelligence Team.

Created at Jun 24, 2024 Updated at Sep 16, 2024
Scan your Python projects for vulnerabilities →

Advisory

A remote code execution vulnerability exists in the create_conda_env function of the parisneo/lollms repository, version 5.9.0. The vulnerability arises from the use of shell=True in the subprocess.Popen function, which allows an attacker to inject arbitrary commands by manipulating the env_name and python_version parameters. This issue could lead to a serious security breach as demonstrated by the ability to execute the 'whoami' command among potentially other harmful commands. See CVE-2024-3121.

Affected package

lollms

Latest version: 9.5.1

A python library for AI personality definition

Affected versions

Fixed versions

Vulnerability changelog

A remote code execution vulnerability exists in the create_conda_env function of the parisneo/lollms repository, version 5.9.0. The vulnerability arises from the use of shell=True in the subprocess.Popen function, which allows an attacker to inject arbitrary commands by manipulating the env_name and python_version parameters. This issue could lead to a serious security breach as demonstrated by the ability to execute the 'whoami' command among potentially other harmful commands. See CVE-2024-3121.


MISC:https://huntr.com/bounties/db57c343-9b80-4c1c-9ab0-9eef92c9b27b: https://huntr.com/bounties/db57c343-9b80-4c1c-9ab0-9eef92c9b27b

Resources

Use this package?

Scan your Python project for dependency vulnerabilities in two minutes

Scan your application

Severity Details

CVSS Base Score

LOW 3.3

CVSS v3 Details

LOW 3.3
Attack Vector (AV)
LOCAL
Attack Complexity (AC)
LOW
Privileges Required (PR)
LOW
User Interaction (UI)
NONE
Scope (S)
UNCHANGED
Confidentiality Impact (C)
NONE
Integrity Impact (I)
LOW
Availability Availability (A)
NONE