CVE-2024-7033

CVSS v3 Score
6.5
Medium

Vulnerability Description

In version 0.3.8 of open-webui/open-webui, an arbitrary file write vulnerability exists in the download_model endpoint. When deployed on Windows, the application improperly handles file paths, allowing an attacker to manipulate the file path to write files to arbitrary locations on the server's filesystem. This can result in overwriting critical system or application files, causing denial of service, or potentially achieving remote code execution (RCE). RCE can allow an attacker to execute malicious code with the privileges of the user running the application, leading to a full system compromise.

CVSS:6.5(Medium)

A path traversal vulnerability exists in the `getFullPath` method of langchain-ai/langchainjs version 0.2.5. This vulnerability allows attackers to save files anywhere in the filesystem, overwrite exi...

CWE-292024
CVSS:6.3(Medium)

Path Traversal: '\..\filename' in GitHub repository pimcore/pimcore prior to 10.5.22.

CWE-292023
CVSS:6.8(Medium)

Path Traversal: '\..\filename' in GitHub repository froxlor/froxlor prior to 2.0.0.

CWE-292023
CVSS:6.2(Medium)

A Local File Inclusion (LFI) vulnerability in OpenLLM version 0.6.10 allows attackers to include files from the local server through the web application. This flaw could expose internal server files a...

CWE-292024
CVSS:7.1(High)

Dell PowerProtect DD versions prior to DDOS 8.3.0.0, 7.10.1.50, and 7.13.1.20 contain a path traversal vulnerability. A local low privileged could potentially exploit this vulnerability to gain unauth...

CWE-292024
CVSS:7.2(High)

A vulnerability in mintplex-labs/anything-llm prior to version 1.3.1 allows for path traversal due to improper handling of non-ASCII filenames in the multer library. This vulnerability can lead to arb...

CWE-292024